(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) socket$inet(0x2, 0x71becf6196f1107, 0x54) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:43:56 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {0x0}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:43:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:43:56 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0, 0xc3, 0x0, 0x6b}, 0x1ff}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) clock_getres(0x4, &(0x7f0000000040)) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:43:57 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9", 0x89}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:43:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40, 0x0) r2 = socket$unix(0x1, 0x400040000000001, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = syz_open_dev$binderN(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) r5 = fcntl$dupfd(r4, 0x203, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 06:43:57 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x0) 06:43:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSTI(r1, 0x5412, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$VT_OPENQRY(r5, 0x5600, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$KDADDIO(r3, 0x4b34, 0x7) 06:43:57 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:43:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000100)=@v2={0x3, 0x0, 0xb, 0xffffffaf, 0xe5, "0543268fe26197d77424d0f06575f1c84e8b31beec2aee69c1fefed34b52746129c735092d8df148e1e08822d92d092f0b871f2767029f01bff80776fe7644c86c5b89b773a3c7f7c18bc40af7c81b7d8b0376cf7429acd4b6fa4eb96a1edef1de305b0e407533695bc896825371814d781ebaeecd537cb537309aa9e5d880785ee4bcc65baea6a1f3dc5fa5b06601e665bd0815d9232754c72c192506070900da75dccd45ba189546725bd7bb1cf4db74eeeea29a28127231241f56ff6c4214a9e4f4924865d2d60ee2d42096699fbdd8e94cba1eae1a5e7c0121f0784226ad45a401da93"}, 0xef, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:43:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x51, 0x0, 0x81, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0, 0x0, 0x0, 0xfe33}}], 0x400003c, 0x2000, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') r3 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r3, 0x0) r4 = dup2(0xffffffffffffffff, r1) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000100)) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r5, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000701000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000702000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000701000/0x1000)=nil, &(0x7f0000ff3000/0xc000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000702000/0x2000)=nil, &(0x7f0000701000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000140)="2dc0b5c9d81b266d", 0x8, r5}, 0x68) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x8, 0x7ff, 0x5, 0xfffffffffffffff8}) 06:43:57 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {0x0}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:43:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:43:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @mss={0x2, 0x8000}, @sack_perm], 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@empty, @in6=@local}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) sendto(r0, &(0x7f0000000100)="a96279020edba3334c437de1faf89831df29632e39be47b19c421817054218fb4217d093fcb544b88ee910617069e9bbd1a84e12d188014f89dd0328b4f9fde224176d60f5885d36149605bd090db153631f0cfc3d1f49fac79ca0eba420dcb6023ccb66f7ac58d409b544ed61f4938c09e437e87a05777c722a3b887a302415895e2d470d7fabdc927e12b41bd3d4a15ac20405ef5c4bffd4ea627857bb981a79c7ec9a098c50a9c00eb32617", 0xad, 0x20000000, &(0x7f00000001c0)=@ethernet={0x1, @dev={[], 0x1d}}, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000240)=0x2, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x10, 0x1, 0x10800) 06:43:57 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a4", 0x8a}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:43:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r3, 0x1b, r4, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xffb7, &(0x7f0000000200)={&(0x7f0000000440)=@getneightbl={0x0, 0x42, 0x400, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x5c}}, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r5, &(0x7f00000017c0), 0x351, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 06:43:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x0) 06:43:58 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:43:58 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:43:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:43:58 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a4", 0x8a}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:43:58 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) rt_sigpending(0x0, 0x0) 06:43:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200030005000000000008000500000000003800030010000000000000000f1600000000000000000000000000000000000000000000000000000200005e5ce89c000000"], 0x7c}}, 0x0) 06:43:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/216, 0xd8}, {&(0x7f0000000380)=""/107, 0x6b}, {&(0x7f00000002c0)=""/30, 0x1e}, {&(0x7f0000000400)=""/54, 0x36}, {&(0x7f00000005c0)=""/112, 0x70}, {&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/43, 0x2b}, {&(0x7f0000000740)=""/89, 0x59}, {&(0x7f00000007c0)=""/131, 0x83}, {&(0x7f0000000880)=""/238, 0xee}], 0xa}, 0x200}, {{&(0x7f0000000a40)=@generic, 0x80, &(0x7f0000001e80)=[{&(0x7f0000000ac0)=""/25, 0x19}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/1, 0x1}, {&(0x7f0000001b40)=""/206, 0xce}, {&(0x7f0000001c40)=""/237, 0xed}, {&(0x7f0000001d40)=""/20, 0x14}, {&(0x7f0000001d80)=""/158, 0x9e}, {&(0x7f0000001e40)=""/54, 0x36}], 0x8, &(0x7f0000001f00)=""/246, 0xf6}, 0xfff}, {{&(0x7f0000002000)=@l2, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002080)=""/171, 0xab}, {&(0x7f0000002140)=""/4096, 0x1000}, {&(0x7f0000003180)=""/237, 0xed}, {&(0x7f0000003280)=""/49, 0x31}], 0x4, &(0x7f0000003300)=""/181, 0xb5}, 0x1}], 0x3, 0x0, 0x0) r0 = gettid() getpriority(0x1, r0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x351, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x400040000000001, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$KDDELIO(r4, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r5 = fcntl$dupfd(r4, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) setuid(r6) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000040)='./file0\x00', r6, r7, 0x400) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000180)) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 06:43:59 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:43:59 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 06:43:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x1a6, 0x10002, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) poll(&(0x7f0000000080)=[{r1, 0x48a}, {r0, 0x1126d8feb5d7a689}, {r0, 0x2}], 0x3, 0x5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:43:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:43:59 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:43:59 executing program 2: creat(0x0, 0x0) eventfd(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000003c0), 0x0) 06:43:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:43:59 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a4", 0x8a}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:43:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x7fff, 0x0, 0x4}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) pipe2(0x0, 0x80000) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r6, 0x1b, r7, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r7, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r8, &(0x7f0000000280)={0x0, 0x184, &(0x7f0000000800)={&(0x7f00000007c0)={0x14, r9}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r7, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x30, r9, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x905}, @SEG6_ATTR_SECRET={0xc, 0x4, [0xca82, 0xfffffffe]}]}, 0x30}, 0x1, 0x0, 0x0, 0x300608c4}, 0x20000000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$P9_RCLUNK(r11, &(0x7f0000000100)={0x7}, 0x7) write(r11, &(0x7f0000000340), 0x41395527) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x80002, 0x0) r12 = socket(0x10, 0x2, 0x0) write(r12, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r12, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa00, 0x0) r13 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400202) 06:43:59 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) close(0xffffffffffffffff) unlink(&(0x7f0000000040)='./file0\x00') 06:43:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r2 = dup2(r0, r1) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000400)) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00', 0xa7, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r3, &(0x7f0000001f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:43:59 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:00 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e640000000014000200080010000b0000000800190000000000"], 0x44}}, 0x0) 06:44:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) write$P9_RVERSION(r0, 0x0, 0x0) 06:44:00 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:00 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x82187201, 0x0) 06:44:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:00 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:00 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) accept4(r1, &(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x80, 0x800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:44:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = creat(0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, 0x0) 06:44:00 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000100)=""/73) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:00 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) r1 = socket(0x0, 0x3, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={0x0}, 0x10) syz_open_procfs(0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000140)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @empty}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x2f5, 0x200007fc, &(0x7f0000000000)={0x2, 0x3, @local}, 0x10) fdatasync(0xffffffffffffffff) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x3d6, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) sendto(r0, &(0x7f0000000040)='J', 0xffffffffffffff7e, 0x8841, 0x0, 0xfffffffffffffebd) shutdown(r0, 0x2) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000340)='threaded\x00', 0xffffffc5) recvfrom$inet(r0, 0x0, 0x0, 0x80040000101, 0x0, 0x2f49b2819fbc7c26) 06:44:01 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) 06:44:01 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e4", 0x27}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:01 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='sched\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000377, 0x7fffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000040)}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_timeval(r3, 0x1, 0x42, &(0x7f0000000000), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:01 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) connect$unix(r0, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e24}, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x351, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:44:01 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:01 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="000000e5ff000000000000006f000000000000003b5cd39d96be4200ff001000000018000000edff9400000000000000115fe3612d834577a95c580af20cd24f4be7a4a7eafdcfc72062a770497c3ad45dcd05f6de9d98596d7179e30a7e065f84f5d0723e7afc06762e196a867d2db1e449c8926dc657dd5047ee783ad667fafe6ffe3da43002485b434dac3c2b3163729388c48e4df7447801fa6fbeee7f3c1a325eaa330f5e1c9e2c413ab7887e9c60ade0863280ebc16e033742003476b95e5bb8633218f3019d61c209"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r6, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r6, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) setsockopt$sock_timeval(r6, 0x1, 0x2a, &(0x7f0000000040)={0x0, 0x2710}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:01 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:01 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) fsync(r3) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000040)={0x1, 0x1, 0xfff7, 0x0, 0x7, 0xe2, 0x8c, 0x8, 0x0, 0x9f}) 06:44:02 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000040)={0x3, 0x7d73, 0x8}) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 06:44:02 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e4", 0x27}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0xc0185879, 0x0) 06:44:02 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = dup2(r0, 0xffffffffffffffff) getpeername$unix(r3, &(0x7f0000000100), &(0x7f0000000040)=0xfffffde1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r6, 0x1b, r7, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r7, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r8 = getpgid(0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = getegid() r12 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/user\x00', 0x2, 0x0) sendmmsg$unix(r7, &(0x7f0000000500)=[{&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000200)="4c2406b94c43da0eea2eb7819a70d436a7ef251636648c083a74730842c4cc87ff7c22ee2c14bc2116188d90697b029d611dd7a94218fd335d0880a55cbd3eb829bcf3e0d3de7aded6888187459468fa468f540339e49d307c7b1969b77c2b894b1f0b498b2ebc4fb2dfef5d87daab35500780b0472c5f371908ca881e51d85819c79ae908405111c21b8f56813fec72685132f6452db6f1d61e06de7fc6759023d8ec1ff595f55cf555474c7f590041ca9da919a27abc3a4a75b429cf2f8b3c728f6a", 0xc3}, {&(0x7f0000000300)="04933c97b7bb264d1f216ceea7b1e3101ae53de9282e1e5a680a77f663428fe9dfe87fdb7687c4baa61a519b351504447575ae1b0796387353648be185b54c1aeebc3f5acb68be2c145f88c78d3cec5a97f33afb85512a5640d5dc011d549a041d83903def46420fcc56d6452ba2b790fa77d842449e86453134a8936c0afe6d7bf90b24a3c97ad75400ec40d1bde3bbcd424c4cfe263e3d4bdec0a2ca3206c2479b46f821fa50e8d93e2776098b97aacdd8b948f5f83e48c9029d033d9e2bc025b2f5351264c4b56593bfd64e9b9b1f15d312ce8f577098a6b42db01a442feddf292ad2b12fa7013670ec7c154c818581", 0xf1}], 0x2, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {r8, r10, r11}}}, @rights={{0x18, 0x1, 0x1, [r1, r12]}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}], 0x50, 0x4}], 0x1, 0x4880) 06:44:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000240)) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:02 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:02 executing program 2: clock_gettime(0x2000000000000006, &(0x7f0000000300)) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)={{0x0, 0x7530}, {0x77359400}}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet(0x10, 0x4, 0x3f) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', @ifru_flags}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0xfffffffffffffc98, 0xee68, 0x54, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x8, 0x0, 0x9, 0x2, 0x5, 0x101, 0x7f}, 0x0, 0x10, r2, 0x2) inotify_init1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x8) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f00000003c0)=0x10000000004053a, 0x4) socketpair(0x11, 0x6, 0x1f, &(0x7f0000000000)) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$sock_int(r6, 0x1, 0x0, 0x0, 0xffffffffffffff12) connect$inet(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) signalfd4(r0, 0x0, 0x0, 0x40800) socketpair$unix(0x1, 0x5, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r8 = dup(r7) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x30b, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xa51, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000140)='syz_tun\x00', 0xd84161b7992131a) write$cgroup_type(r8, &(0x7f0000000100)='threaded\x00', 0xffea) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$IPVS_CMD_SET_INFO(r10, 0x0, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, 0x0, 0x0) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0x163) 06:44:02 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000100)={{{@in, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) 06:44:02 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$cont(0x11, r1, 0x0, 0x0) 06:44:02 executing program 2: 06:44:02 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:02 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:02 executing program 2: 06:44:03 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e4", 0x27}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x59f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:03 executing program 2: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000020000007c00010008000300fdffffff92fe030000000000100001007564703a73797a3000000000100001007564703a73797a30000000001000010069623a766c616e30000000000800030000000000040002002c0004001400010002"], 0x3}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000340)={0x1c}, 0x1c}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 346.704508] FAT-fs (loop2): Invalid FSINFO signature: 0x200003c0, 0x00000000 (sector = 1) [ 346.781752] FAT-fs (loop2): codepage cp437 not found 06:44:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000240)) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {0x0}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r2, 0x1b, r3, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r3, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r4 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040)) recvmmsg(r4, &(0x7f0000003140), 0x0, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) finit_module(r6, &(0x7f00000000c0)='\xb4\\cgroup\\)(}\x00', 0x3) r7 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockname$packet(r7, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000201126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r8, 0x1b, r9, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r9, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$TCGETS(r9, 0x5401, &(0x7f0000000080)) r10 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r10, &(0x7f00000017c0), 0x351, 0x0) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000300)=""/233) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) 06:44:03 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) 06:44:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='sched\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000377, 0x7fffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000040)}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_timeval(r3, 0x1, 0x42, &(0x7f0000000000), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:03 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x28002, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x64000228}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x10, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x4008080) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:03 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:03 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/enforce\x00', 0x2, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000100)={0x521e042f, 0x9}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x400040000000001, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$KDDELIO(r4, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0xfffffffffffffeeb) recvmmsg(r2, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0xfffffd1c, 0x0, 0xfffffffffffffddf, 0x0, 0x32a}, 0x4}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r5, &(0x7f00000017c0), 0x351, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$packet(r9, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) getsockname$packet(r9, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) setns(r7, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) r12 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r12, 0x0) bind$unix(r12, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r12, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r12, 0xc0406619, &(0x7f0000000180)={{0x1, 0x0, @identifier="0050bb3be8295a3debfe86386752c214"}}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000140)={0x0, 0x52, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[], 0x28}}, 0x34000100) r14 = accept(r13, &(0x7f0000000240)=@nfc_llcp, &(0x7f00000001c0)=0xffffffffffffff9c) ioctl$sock_TIOCOUTQ(r14, 0x5411, &(0x7f0000000200)) r15 = socket$unix(0x1, 0x400040000000001, 0x0) r16 = dup3(0xffffffffffffffff, r15, 0x0) ioctl$KDDELIO(r16, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r16, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) ioctl$EVIOCGSND(r16, 0x8040451a, &(0x7f00000002c0)=""/210) [ 347.401823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15033 comm=syz-executor.5 [ 347.462728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15033 comm=syz-executor.5 06:44:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b2", 0x3b}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x84800, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) 06:44:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000240)) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r6, 0x1b, r7, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r7, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r7, &(0x7f0000000100)="9fd79d6cd4ba69634692e356d757fdcf9cd52fbae1d17930bbd9be55126e63bafb0719dc1e3bd6b41049ea6454f87ce46404ea9445afeb91f0794ebbc743673d6e4ee71984c57aa12b65214c45fc131a997adad588ae3ce11d65819e49b21e4fe83172841ff98c213384292d00975d7fa159b648b2079790bd2cacea2e19ac13490d36e7ae393f1bf3337b39dc2c831919", &(0x7f00000001c0)="242f16f685c02e657b20d623ca4e5b10c6aa775cbbd29a46c49528af34ab7ae7198663084df4d74570855c31e80c0b1b4e4b861f13dcd19f62d7be903d33e05495c2a1cd417e737dbbcd3d3b53a86ec869a12dbddde66912fc16a534a53088a7", 0x2}, 0x20) ioctl$VT_RELDISP(r3, 0x5605) 06:44:04 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {0x0}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:04 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:04 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2000, 0x0) recvmmsg(r0, &(0x7f0000003140), 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x351, 0x0) eventfd(0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) write$eventfd(r5, &(0x7f0000000140)=0x9, 0x8) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RWRITE(r6, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0x40000001}, 0xb) 06:44:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='statm\x00') preadv(r1, &(0x7f00000017c0), 0x351, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = gettid() getpriority(0x1, r4) sched_getscheduler(r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:44:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb0", 0x87}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:04 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b2", 0x3b}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {0x0}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) pipe(&(0x7f0000000140)={0xffffffffffffffff}) read(r5, &(0x7f0000000000)=""/250, 0xedf1d44) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff}) read(r7, &(0x7f0000000000)=""/250, 0xedf1d44) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000001c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f00000001c0), 0xfffffef3) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket(0x1, 0x803, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r14}]]}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000300)={'team0\x00', r12}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xfe16) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r17, 0x0, 0x0, 0x110003) lseek(r17, 0x0, 0x3) r18 = syz_genetlink_get_family_id$team(0x0) r19 = open(&(0x7f0000000400)='./bus\x00', 0x40, 0x1c4) getpeername$packet(r19, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r20}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r20}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@local, @loopback, r20}, 0xc) r21 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r21, r21, 0x0, 0xdd) getpeername$packet(r21, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r22}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r22}, 0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r24 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r27 = dup2(r25, r26) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_GET(r17, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x17100010}, 0xc, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES16=r18, @ANYRES64=r27, @ANYRES32=r16, @ANYBLOB="9000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ff7f0102020000000500000700000000abed021f0000000008000100", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r23, @ANYRES64=r24, @ANYRESHEX=0x0], @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r20, @ANYBLOB="b800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005b4800003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r22, @ANYBLOB="000102004000017bc20001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462716c010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002bdb00", @ANYRES32=r16, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040080000202008000000600070601"], 0xf}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r28 = socket$nl_route(0x10, 0x3, 0x0) r29 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r29, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r29, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r31 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r31, 0x0, 0x0) getsockname$packet(r31, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r28, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002a80)=@newlink={0x60, 0x10, 0x40d, 0x3, 0x0, {0x0, 0x0, 0x0, r30}, [@IFLA_LINKINFO={0x40, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x34, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @loopback}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x5}, @IFLA_VTI_LINK={0x8, 0x1, r32}, @IFLA_VTI_IKEY={0x8, 0x2, 0x9}, @IFLA_VTI_OKEY={0x8, 0x3, 0x4}]]}}}]}, 0x60}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r34, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_XFRM_POLICY(r34, 0x0, 0x11, &(0x7f0000000380)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000480)=0xe8) r36 = socket$netlink(0x10, 0x3, 0x0) r37 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r37, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r37, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r39 = socket(0x1, 0x803, 0x0) getsockname$packet(r39, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r36, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r38}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r40}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000600)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8800000}, 0xc, &(0x7f0000000640)={&(0x7f0000000840)={0x2f8, r6, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r8}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r15}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4f0}}}]}}, {{0x8, 0x1, r20}, {0x13c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r33}}}]}}, {{0x8, 0x1, r35}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r40}, {0x80, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r41}}}]}}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x20008000}, 0x41001) r42 = socket$inet6_tcp(0xa, 0x1, 0x0) r43 = fcntl$dupfd(r42, 0x0, r42) ioctl$PERF_EVENT_IOC_ENABLE(r43, 0x8912, 0x400200) getsockname$packet(r43, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r43, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) r45 = socket$inet6_tcp(0xa, 0x1, 0x0) r46 = fcntl$dupfd(r45, 0x0, r45) ioctl$PERF_EVENT_IOC_ENABLE(r46, 0x8912, 0x400200) getsockname$packet(r46, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r48 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r47, 0x1b, r48, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r49 = socket$inet6_tcp(0xa, 0x1, 0x0) r50 = fcntl$dupfd(r49, 0x0, r49) ioctl$PERF_EVENT_IOC_ENABLE(r50, 0x8912, 0x400200) getsockname$packet(r50, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r52 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000014000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r51, 0x1b, r52, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r53 = socket$inet6_tcp(0xa, 0x1, 0x0) r54 = fcntl$dupfd(r53, 0x0, r53) ioctl$PERF_EVENT_IOC_ENABLE(r54, 0x8912, 0x400200) getsockname$packet(r54, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r56 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000155ee9f10000000000ff0f000085800000640000001126ea00ffffffff350018007914c0e714b8a9f5"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r55, 0x1b, r56, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r57 = socket$inet6_tcp(0xa, 0x1, 0x0) r58 = fcntl$dupfd(r57, 0x0, r57) ioctl$PERF_EVENT_IOC_ENABLE(r58, 0x8912, 0x400200) getsockname$packet(r58, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r60 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xb, 0x200000000000000e, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x7d, &(0x7f0000000b40)=""/125, 0x41100, 0x6, [], r59, 0x1, r60, 0x8, &(0x7f0000000500)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x7, 0x6, 0x1f}, 0x10}, 0x70) r61 = socket$inet6_tcp(0xa, 0x1, 0x0) r62 = fcntl$dupfd(r61, 0x0, r61) ioctl$PERF_EVENT_IOC_ENABLE(r62, 0x8912, 0x400200) getsockname$packet(r62, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r64 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r63, 0x1b, r64, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r65 = socket$unix(0x1, 0x400040000000001, 0x0) r66 = dup3(0xffffffffffffffff, r65, 0x0) ioctl$KDDELIO(r66, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r66, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) getsockopt$inet6_IPV6_IPSEC_POLICY(r66, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000003000)=0xe8) r68 = socket$inet6_tcp(0xa, 0x1, 0x0) r69 = fcntl$dupfd(r68, 0x0, r68) ioctl$PERF_EVENT_IOC_ENABLE(r69, 0x8912, 0x400200) getsockname$packet(r69, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r71 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r70, 0x1b, r71, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r72 = socket$unix(0x1, 0x400040000000001, 0x0) r73 = dup3(0xffffffffffffffff, r72, 0x0) ioctl$KDDELIO(r73, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r73, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) getsockopt$inet_mreqn(r73, 0x0, 0x23, &(0x7f0000003080)={@rand_addr, @empty, 0x0}, &(0x7f00000030c0)=0xc) r75 = socket$inet6_tcp(0xa, 0x1, 0x0) r76 = fcntl$dupfd(r75, 0x0, r75) ioctl$PERF_EVENT_IOC_ENABLE(r76, 0x8912, 0x400200) getsockname$packet(r76, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r78 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r77, 0x1b, r78, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000003400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x212df42b44b9d5e7}, 0xc, &(0x7f0000003100)={&(0x7f0000003180)={0x260, r6, 0x300, 0x70bd25, 0x1ff, {}, [{{0x8, 0x1, r44}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r47}}}]}}, {{0x8, 0x1, r51}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xaa70}}}]}}, {{0x8, 0x1, r55}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x31a5}}}]}}, {{0x8, 0x1, r59}, {0x174, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r63}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r67}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xbe}}, {0x8, 0x6, r70}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r74}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r77}}}]}}]}, 0x260}, 0x1, 0x0, 0x0, 0x48}, 0x7b9a2f6e0b3a2385) 06:44:05 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:05 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb0", 0x87}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:05 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b2", 0x3b}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:05 executing program 5: r0 = socket$unix(0x1, 0x400040000000001, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) recvmmsg(0xffffffffffffffff, &(0x7f0000002c00)=[{{0x0, 0x0, &(0x7f0000002240)=[{&(0x7f0000000100)=""/4096}, {&(0x7f0000001100)=""/3}, {&(0x7f0000001140)=""/4096}, {&(0x7f0000002140)=""/247}], 0x0, 0x0, 0x2f6}, 0x3}, {{&(0x7f0000002280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x0, &(0x7f0000002580)=[{&(0x7f0000002300)=""/50}, {&(0x7f0000002340)=""/234}, {&(0x7f0000002440)=""/13}, {&(0x7f0000002480)=""/226}]}, 0x5}, {{&(0x7f00000025c0)=@nfc_llcp, 0x0, &(0x7f0000002840)=[{&(0x7f0000002640)=""/145}, {&(0x7f0000002700)=""/10}, {&(0x7f0000002740)=""/194}]}, 0x7ff}, {{&(0x7f0000002880)=@ipx, 0x0, &(0x7f0000002b80)=[{&(0x7f0000002900)=""/17}, {&(0x7f0000003180)=""/4094}, {&(0x7f0000002940)=""/176}, {&(0x7f0000002a00)=""/180}, {&(0x7f0000002ac0)=""/140}], 0x0, &(0x7f0000004180)=""/4096}, 0x10001}], 0x68a, 0x20000000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x351, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r5, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) ioctl$LOOP_SET_FD(r2, 0x4c00, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 06:44:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0}, 0x800000}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) write$P9_RATTACH(r5, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x114, 0x0, 0x8}}, 0x14) 06:44:06 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:06 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) [ 349.888797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=617 sclass=netlink_route_socket pig=15124 comm=syz-executor.5 06:44:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000040)=0x78) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x920ec09f82198274, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f00000002c0)={0x1, 0x0, 0x1000, 0xb5, &(0x7f0000000100)="e5bb484e0324f8c6cdb446e936f09de65125d4c2c04ba1f140cfee720feb5856d5ace6bf772fad48eec113fa2000014e3efeafd464e879e618e29855cab3ab7a5c225e04b8c781c8001052db74d86d8a3693a0a173c32181b50071d65b0af5a1f02fd4a165e358e4ca2f33bdcbeab1ec062694afc0fed62d5891296d6acd635a8beb6b385e1cdedb44c6b94565257193ca53fbd8d277c495028c65bdd07f3bd82345bd8f4e605123cab7ef0c69244d45f6e2fc7ebb", 0xfa, 0x0, &(0x7f00000001c0)="683df7534712aac38849c91655edf0a0a1a4401c1c53724766ef5d777778b24b32045bf66222d9e9f15cdd2e458be0f071a441c4bf6343900cf2a602324514d9420c284edc245cd41e7dadfec18ff81377b0aa4dc4702c57a86fe1bc6eb866fb7a70b7a51bd10d5ab149848485e30fe4b3b98e997dc47d541d23b8df5eddd0deee337275ce34c397f0497fa9a1bbe9570eec1cf5a1197f44ea4e57132b9d8eeab8615d05863b2d5958e1832df09a514ffb1863446ae76aab5ff845b0f3d0410d04352a42cb0ca287176a1a64fae3f40df07033ae422c8573a4170f15379fcff124679c4a855d8da1371c06af56ce6b42c1bfe22d73b4d1538505"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], 0x0, 0x1b, r3, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r3, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) accept$packet(r3, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000007c0)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0xf5, r4, 0x1, 0x0, 0x6, @local}, 0x14) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r5, &(0x7f00000017c0), 0x351, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 06:44:06 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb0", 0x87}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:06 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea9127", 0x45}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4000, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:44:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) pread64(0xffffffffffffffff, &(0x7f0000000600)=""/78, 0x4e, 0x0) preadv(r0, &(0x7f00000017c0), 0x0, 0xffffeffffffffff7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) symlinkat(&(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000380)='./file0\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockname$packet(r10, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r12 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r11, 0x1b, r12, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r12, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/member\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x1, &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR, @ANYRES16=r12, @ANYRES32, @ANYRESDEC]], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r7, 0x5, r8, 0x8, &(0x7f0000000500)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r8, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) accept4$unix(r8, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:44:07 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:07 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0, 0xf55e8db3}}], 0x3fffffffffffe0d, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$P9_RSTAT(r2, &(0x7f0000000100)={0x60, 0x7d, 0x2, {0x0, 0x59, 0x6, 0x7fff, {0x50, 0x2, 0x6}, 0x2000000, 0x0, 0x2, 0xfffffffffffffff8, 0x1b, 'vmnet1^cpuset(wlan0(procem0', 0x5, ',ppp1', 0x6, 'stack\x00'}}, 0x60) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) pread64(r1, &(0x7f0000000180)=""/186, 0xba, 0x4) ptrace$peek(0x1, 0xffffffffffffffff, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x2200, 0x0) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x163a) 06:44:07 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:07 executing program 5: r0 = gettid() getpriority(0x1, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000e07a41c68a840b88616b2c7653039da21eb6b75ad5ce6823c7e4fea50c6c337d8fa88d2b53f53e6e6f3bfc4808d26bb1e81a01094ecf512b834d0d3b7972d12aa3a8724e2bfc6acd6fe6806d43992b7977f604f84fd342be27299bf4160ecfd171c90ec06a9770953cad5a5c4d5899f046df46a736bc17544b874df39b221ff8cdaf00fdd6fe98e30f71750ca5c45b33e897e8935d0d1c0ea5396369d9914e2d70ff57f95496a1f8f54806b0f85d2e"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r3, 0x1b, r4, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) rt_tgsigqueueinfo(r0, r5, 0x3b, &(0x7f0000000140)={0x32, 0x2, 0x3}) r6 = gettid() getpriority(0x1, r6) r7 = syz_open_procfs(r6, &(0x7f00000003c0)='net/ip_vs\x00') preadv(r7, &(0x7f00000017c0), 0x351, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) umount2(&(0x7f0000000200)='./file0\x00', 0x1) 06:44:07 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:07 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:07 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea9127", 0x45}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:07 executing program 5: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r2, &(0x7f00000014c0)="81ee6bf60dc2b9f018ff9f460af100819e2a7fca4ca99924cbb5447847444108c698995e2fdd5aa33ea866d0eb3839c62234ae889812b077817169779aa08d36d4a44551bf0293a97cfe509252818030d571680ad108a24dfe9c3a60d0fb3aff8e40831399ee53c3f330ac92afb7fbf370c8704dfb6de8ae115178b09b3a3d4c9ad7192a00df9904a66215061b873974aac383d603c64d064d02b0ce1137a8a8008d64ea7f39d05622bb4503a67e9dbf2ebe4de85a2989a572d77e57b0bfb6eede0dbaeb99a7645ff905f33c766caa5b0e197efec444993309add80390d107cd6b4fcbbe6187ae4fcd3263144e02f0d43a529c52", &(0x7f0000000380)="2ee9e9ad46a9c613e385b8bbb3b678de320c0bdb2f24e7fc5246f71e78fca1809b18c19e1aa6cec353160253744ec1b60fb6531da0cd683bfbf989025904fb9a9b81fc038cc6ad7f7051efb591c4829120dbb6d7b449ddcf3137148602d03c8265f6858470600bb0cd1b2114799729ccb2e9dd2fb42a10f635b8e58c70d0dfa9453525fbfda341b6ab6907b2cd66958a40aee938587a308835c214b826467d2e31b876199e64102f1ee8066bfad39684a144"}, 0x20) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000180)=""/60}, {&(0x7f00000001c0)=""/50}, {&(0x7f0000000200)=""/93}, {&(0x7f0000000280)}, {&(0x7f00000004c0)=""/4096, 0xffffffffffffff87}, {&(0x7f00000002c0)=""/38}], 0x10000197, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000100)=0x0) syz_open_procfs(r7, &(0x7f0000000140)='mountinfo\x00') r8 = gettid() getpriority(0x1, r8) sched_setattr(r8, &(0x7f00000015c0)={0x30, 0x0, 0x0, 0x10000, 0x8000, 0xffffffffffff0000, 0xb9de, 0x3}, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000040)=0x800, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 06:44:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000140)="bf5f939fccc50eb367016f7f9604b340861c273c45a9937b4d5c46a4bab22352b2fdcdf5bd28d40e397b820d182dc64a1ddbc88af53dcc", 0x37, 0x80000001}, {&(0x7f0000000180)="2cf49c2c2a", 0x5, 0x6}, {&(0x7f00000001c0)="d54fa89c82a3b779660796cfd33cb547210bd02bd8093b9371fefce8343a57b5e466", 0x22, 0x2}, {&(0x7f0000000200)="114d482b102437f310482679d043bab6ebdd10b9b4826ea2da9590c3ee903393ec28a4a290e25364428706286ec3be4f02ef107ccb5afad54e52c8e9a38a1be6e560f8a8be972e49d5a6c89b703f38f7243d15cf4d0c81f828669ca5b381371e71f06688a78aafffc61c7cdcf1f50d87380f7304ebdee1adc68feb08449fc017bdc4393204a25c37debd60dac6c530dbd89c", 0x92, 0x1000}], 0x4000, &(0x7f0000000480)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@mblk_io_submit='mblk_io_submit'}], [{@uid_lt={'uid<', r3}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@dont_hash='dont_hash'}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@subj_user={'subj_user', 0x3d, 'stack\x00'}}, {@dont_appraise='dont_appraise'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000580)='ext3\x00', &(0x7f00000005c0)='./file0\x00', 0x4, 0x1, &(0x7f0000000680)=[{&(0x7f0000000600)="05fbd40f859c72551f6e2d8ca97b75d0bfa62b3a9c191b56a392ebd40533252c2d5396a9ce14a8daa659be6307776479fda7138b028e829d60979bb529eddfb496e447", 0x43, 0x7}], 0x280000, &(0x7f00000006c0)={[{@minixdf='minixdf'}, {@block_validity='block_validity'}, {@debug='debug'}], [{@smackfsroot={'smackfsroot', 0x3d, '&/selinux'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user_u'}}]}) 06:44:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:08 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r0, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r6, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x40000008, 0x6, 0x2001f}, 0x10}, 0x70) bind$packet(r6, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockname$packet(r8, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r10 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r9, 0x1b, r10, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r10, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockname$packet(r12, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r14 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r13, 0x1b, r14, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) setsockopt$packet_drop_memb(r10, 0x107, 0x2, &(0x7f0000000140)={r13, 0x1, 0x6, @remote}, 0x10) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x810, r6, 0x7d256000) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000100)=0xffffffffffffeb25) r15 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) 06:44:08 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r0, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:08 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r0, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002240)=[{{&(0x7f0000000100)=@nl=@proc, 0x0, &(0x7f0000000500)=[{&(0x7f0000000180)=""/135}, {&(0x7f0000000240)=""/253}, {&(0x7f0000000340)=""/241}, {&(0x7f0000000440)=""/155}], 0x0, &(0x7f0000000540)=""/27}, 0x511}, {{&(0x7f0000000580)=@alg, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000600)=""/221}, {&(0x7f0000000700)=""/182}, {&(0x7f00000007c0)=""/58}, {&(0x7f0000000800)=""/155}, {&(0x7f00000008c0)=""/213}, {&(0x7f00000009c0)=""/181}, {&(0x7f0000000a80)=""/11}, {&(0x7f0000000ac0)=""/4096}, {&(0x7f0000001ac0)=""/140}], 0x0, &(0x7f0000001c40)=""/108}}, {{&(0x7f0000001cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, &(0x7f00000021c0)=[{&(0x7f0000001d40)=""/16}, {&(0x7f0000001d80)=""/227}, {&(0x7f0000001e80)=""/232}, {&(0x7f0000001f80)=""/89}, {&(0x7f0000002000)=""/182}, {&(0x7f00000020c0)=""/99}, {&(0x7f0000002140)=""/67}]}, 0x10001}], 0x4000000000001b8, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea9127", 0x45}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000040)=0x68) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000001c0)=""/209) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:44:08 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea9127", 0x45}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:09 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c5778", 0x6f}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x88, r3, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffbff}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x150) 06:44:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:09 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:44:09 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:09 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a9", 0x4a}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selifux/chY\xa8kreqprot\x00', 0x24a180, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r3, 0x0) bind$unix(r3, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r3, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x7) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400201) 06:44:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:09 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:09 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c5778", 0x6f}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45c1, 0x20d00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x800, 0x2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000060000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) r4 = gettid() getpriority(0x1, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) r6 = dup3(r5, r3, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7, 0x3f, 0x1, 0x7f, 0x0, 0x100, 0x40221, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x2, 0x1}, 0x209, 0xfff, 0x200, 0x7b19b79f1f2f2ea6, 0xea8, 0x200, 0x7fff}, r4, 0xa, r6, 0x8) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)) 06:44:10 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a9", 0x4a}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:10 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) close(r2) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:10 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c5778", 0x6f}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$BLKPG(r2, 0x1269, &(0x7f00000003c0)={0x200009, 0x2, 0xffffffffffffff0f, &(0x7f0000000400)="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"}) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x8, 0x80000, 0x3f) getsockopt$inet_udp_int(r4, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x9, 0x8000, 0x6}, 0x1c) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000100)=""/35, &(0x7f0000000140)=0x23) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGID(r5, 0x80084502, &(0x7f0000000600)=""/4096) 06:44:10 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:11 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r2, 0x107, 0xc, &(0x7f0000000080)=0x2, 0x1) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @random="a3507fe8ee7b"}, 0x10) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:11 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:11 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:11 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a9", 0x4a}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001109000000ffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r6, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r6, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockname$packet(r8, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r9 = ioctl$TUNGETDEVNETNS(r8, 0x54e3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r6, 0x2, r9) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:11 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:11 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000100)=0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x6, 0x4e23, 0x1, 0x0, 0x60, 0xa0, 0x3a, r2, r3}, {0x8, 0x5, 0x0, 0x200, 0x3, 0x0, 0xfffffffffffffffc, 0x7ff}, {0x3, 0x1000, 0x3, 0x1}, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1}, {{@in6=@mcast1, 0x4d4, 0x6c}, 0xa, @in6=@loopback, 0x34ff, 0x0, 0x2, 0x80, 0xffffffc1, 0x3ff, 0x10000}}, 0xe8) epoll_pwait(r1, &(0x7f0000000180)=[{}, {}, {}, {}], 0x4, 0x10000, &(0x7f00000001c0)={0x3}, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000000)) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:11 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e", 0xa6}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:11 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:12 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000100)={'sec\t\x00ity\x00\x06\x00\x00\xf5\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x97\x00', 0x1, "2215ae125b20ec7ceaed04e5b5dde2a27286a8250ea2a761eda2f1dc5de6c586beaef0eedb196569beca1274fc7f05f0d7d8b4195f3b617621cf4510cc1a643add3ccdf396f0139a12b723b5a79116b154fb7d3a61a5e342afe498d860df18b00f836a11a02e973eeb2bd5a01f5a606eef27b581f7aef52c919e59a7bd97fd7a00bde9e1642a58e47c469b96bdcb0de959f6d8e175d9678688f11887b0188c418204e7202ef6dbbe509ba2b7b08caefff6892ead5d71f2f1bd0229f2964228d65be016e955719476cfb8eaafa3316f9d10bc812ac710740f378a6705d2ffd04a33"}, &(0x7f0000000040)=0x105) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a92388", 0x4c}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:12 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) write$P9_RFSYNC(r0, &(0x7f00000001c0)={0x7, 0x33, 0x1}, 0x7) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = gettid() getpriority(0x1, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000ae3100000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000340)=""/113, 0x41000, 0xe, [], r7, 0x1b, r8, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x40000b, 0xffff, 0x1f}, 0x10}, 0x70) bind$packet(r8, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x80, 0x7, 0xff, 0x15, 0x0, 0x0, 0x40088, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x0, 0x8, 0x5, 0x6, 0x4}, r4, 0xb, r8, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockname$packet(r10, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) fcntl$setflags(r10, 0x2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) syz_emit_ethernet(0x1e, &(0x7f0000000100)=ANY=[@ANYBLOB="fffffffdffff92758e51ccc1000c0200006007000037a96fc98afa856bd9"], &(0x7f0000000140)={0x1, 0x1, [0x5d6, 0x8f9, 0xc28, 0x34d]}) r11 = creat(&(0x7f0000000000)='./file0\x00', 0x22) ioctl$KDGKBMETA(r11, 0x4b62, &(0x7f0000000040)) setsockopt$packet_tx_ring(r11, 0x107, 0x5, &(0x7f00000000c0)=@req={0x9, 0x0, 0x1c, 0xfffffffe}, 0x10) 06:44:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:12 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8001) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/member\x00', 0x2, 0x0) fstat(r3, &(0x7f0000000300)) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r4, 0x1b, r5, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) write$P9_RXATTRCREATE(r5, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r6, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:12 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:12 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e", 0xa6}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:12 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:13 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) setsockopt$inet_udp_int(r4, 0x11, 0x66, &(0x7f0000000000), 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r7, 0x1b, r8, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r8, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x7) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:13 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a92388", 0x4c}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4000, 0x0) pidfd_send_signal(r1, 0x2, &(0x7f0000000100)={0x38, 0x6, 0x5}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) r8 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r8, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r8, 0x0) fcntl$F_SET_RW_HINT(r8, 0x40c, &(0x7f0000000200)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r6, 0x1b, r7, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r7, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) write$cgroup_type(r7, &(0x7f0000000040)='threaded\x00', 0x9) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) fcntl$dupfd(r0, 0x0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$unix(0x1, 0x400040000000001, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$KDDELIO(r5, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) ioctl$TIOCCBRK(r5, 0x5428) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r3, 0x2) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$packet_int(r6, 0x107, 0x19, &(0x7f0000000080)=0x1000, 0xfffffffffffffd97) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockname$packet(r10, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r12 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000ca7b046b7596ff0f00008580000064000034a3d0001126ea00ffffffff35001800000000009500000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r11, 0x1b, r12, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r12, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r13 = accept4$packet(r12, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80000) setsockopt$packet_tx_ring(r13, 0x107, 0x5, &(0x7f0000000000)=@req3={0x8000, 0x7ff, 0x8000, 0x8, 0x20}, 0xffffffffffffff62) socket$inet6_tcp(0xa, 0x1, 0x0) 06:44:13 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e", 0xa6}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:13 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r3, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x7]}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xa90}]}, 0x28}}, 0x80) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r4, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:13 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000000)=""/70) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:13 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x800, 0x0) ioctl$TIOCNXCL(r3, 0x540d) 06:44:14 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a92388", 0x4c}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socket$netlink(0x10, 0x3, 0xd) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x3, 0x9, 0x0, 0x5, 0x58, 0x20, 0x3ff}, 0x1c) r3 = add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="ecccb3e9108672a66d1b2a69c3aeec552f4ce52a9ffa458c454f43849ec19c8499994d9c3346df3adce5b748f672c3df7b77013af6f0a0353a895b04a6cfbab6cbd4ff95cf9416c611bd403a9c4ef963f89b79e6159320bc40d990b49ea8eb93dfd6a03a447c0d4c6cbe34955cdb41e6e585df17430233c7991651caa4b7dc5576b30f36d5b3d210e965d103d3b9adf4462668ff4a70214f22d47a01c72f202974a22064675e970de2a9fc4e553a38a79f7831e9ccbf", 0xb6, 0xfffffffffffffff8) keyctl$clear(0x7, r3) 06:44:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5", 0xc2}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:14 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:14 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x66}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000040)={{0x1, 0x0, @descriptor="a7b14d3cce8b5722"}}) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:14 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r2, 0x1b, r3, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r3, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) fcntl$setflags(r3, 0x2, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:15 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b", 0x4d}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)=0x800) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000100)) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) rename(&(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00') 06:44:15 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5", 0xc2}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:15 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r6, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r6, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$FIGETBSZ(r6, 0x2, &(0x7f0000000040)) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) creat(&(0x7f0000000000)='./file0\x00', 0x0) 06:44:15 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='statm\x00') ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/28}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b", 0x4d}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {0x0}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:16 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5", 0xc2}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) sendto$inet(r2, &(0x7f0000000100)="06022cf50b97d4dbad6d54eca43d9db9febf5650f06c060533ee4f69ced9fbb441b756a2db08be599ca22415e2ba135cce162bc0245e7fd0aad2d3bc219f6a536f6cc569a002f98323947777b9989e6026aeed97161a8fd14ffdb811a8c09a245d3265182ad5c1085be5de81f98c94b505df2122b39e1c01980d6dde08b53959c8f1a7f69d7894affe67b3447b025dec12bbde91a594d5921f009786e7ee3ebbb151c5568cbf869f32461ab50938f61b912f229b9dd69b425378a0608199a95b399e879eb5a018fef1322557d03cab5cc7c55ecb0a", 0xd5, 0x4, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0x0, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:16 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:16 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') 06:44:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b", 0x4d}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {0x0}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x1e, &(0x7f0000000080)=0x2, 0x4) r3 = gettid() getpriority(0x1, r3) r4 = socket$unix(0x1, 0x400040000000001, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$KDDELIO(r5, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockname$packet(r7, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r8, 0x1b, r9, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockname$packet(r11, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) bind$packet(r11, &(0x7f0000000000)={0x11, 0x18, 0x0, 0x1, 0xf0, 0x6, @remote}, 0xfffffffffffffe6d) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r9, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) rt_tgsigqueueinfo(r3, r12, 0xb, &(0x7f0000000100)={0x1c, 0x1, 0x1}) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece", 0xd0}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2000, 0x0) fstat(r3, &(0x7f0000000180)) r4 = accept(r1, &(0x7f0000000000)=@ax25={{}, [@bcast, @remote, @default, @null, @netrom, @rose, @netrom, @default]}, &(0x7f0000000100)=0x80) setsockopt$packet_int(r4, 0x107, 0xb, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:17 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) readahead(r0, 0x7fff, 0x4) 06:44:17 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0, 0x2d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB='#\x00', @ANYRES32=r1, @ANYBLOB="140001000600f0ff000700000001acc4b9ebc9d6bb97200d7bf8e5722b2f81241487ab7332f6a82db2851e15434ee9ce5f25d047478a23978af07e51034922f184ef834d5ec09fce2427194c000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) r2 = gettid() getpriority(0x1, r2) sched_setaffinity(r2, 0x8, &(0x7f0000000040)=0xffffffff) 06:44:17 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) r4 = socket$unix(0x1, 0x400040000000001, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$KDDELIO(r5, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) getsockname$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r6, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r6, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) fsync(r6) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket(0xdc4587392a80e33, 0x0, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x40, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0x0) epoll_create(0x3c51) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000140)=@req3={0x8000, 0x6, 0x8000, 0x6, 0xfffffff9}, 0x1c) 06:44:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {0x0}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:18 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece", 0xd0}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) fcntl$getownex(r3, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setattr(r4, &(0x7f0000000040)={0x30, 0x3, 0x1, 0x3, 0x0, 0x4, 0x9, 0xe55}, 0x0) socket$unix(0x1, 0x400040000000001, 0x0) r5 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r5, 0x0) bind$unix(r5, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r5, 0x0) r6 = dup3(0xffffffffffffffff, r5, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) setsockopt$packet_int(r6, 0x107, 0xb, &(0x7f0000000080)=0x2000007, 0x101b4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socket$netlink(0x10, 0x3, 0x10) 06:44:18 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:18 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:18 executing program 2: readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)=""/76, 0x4c) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r4, 0x1b, r5, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={r4, @rand_addr=0x4, @multicast1}, 0xc) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x9, 0x6}, 0x1c) 06:44:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_buf(r2, 0x6, 0x21, &(0x7f0000000100)="deb9b05b8829280acd844dd16063e9f081a8fde9a58f3343a1a2f1fe179607817e450e589dadce6ff6d5d511d3867635bf343ce1bae2fd785c7697c7d9daa8f71916f95ed7929fd4eba7ee07695d39d7a631a44e358869f8278731508a4a0463a6b8c0b02b0c473d8de71df0ca2174428eacac55e49b59b36ab3097c5e1953a50b55c0c91ffbcf58422b29b130ac74ded446299b484bfbcf9b3ea1a5417bcf0ad60226cacbf6306fb4dee2ef5148eed954d37c8865ec28623767442a0421819d35a21dac6d479c4d1634b23931c9e76b127da8bd4a2ac12d8d264daed98617051216", 0xe2) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x4, 0x1, 0x800000, 0xf13}, 0x10) 06:44:19 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece", 0xd0}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) openat$cgroup_ro(r4, &(0x7f0000003e40)='memory.swap.current\x00', 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000003e80)=0x5, 0x6f33324e573fb45e) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:19 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000040)) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r3, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x26e, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:19 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:19 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000100)={0x1, 0x0, 0x8, 0x2, 0x677}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) umount2(&(0x7f0000000000)='./file0\x00', 0x1) 06:44:20 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594", 0xd7}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg(r2, &(0x7f0000000780)={&(0x7f0000000000)=@generic={0x4, "8d0c1d4889b4f0ec0c9264f8ef68a39bdbd2c6b283db4d8d87b9ed2c9b63e54a46f672c5770f061d407893f45230fb042debe308c2e14271d7059ddfc53339912088cfb1602501565dedb520efb389620fee8cc123a945d873d889fe41618cdd5431edf47bd1ac8f8a3cafd41e79d69318df72395b29d262067f1f7f3c61"}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000100)="b40a92c87b621dd6cec778", 0xb}, {&(0x7f0000000140)="b05a4fb9dc96226053e9c418d9e2b9ef2d594a288761d7b46de1df4faf2bed10e85466c43293", 0x26}, {&(0x7f0000000180)="7da2c0a9aaaaf159d7e486c451444b6f02b4c8f85fdfe3fa9f5ff43563690ca7355d1eb3fd2abfe736e0c1f92ec8316bf1b4c7ee4bfde3d6269c0f475c9c4f4f18dd308e1499f7c18d60b7d0abecf5289546ec8f4cf5c9f2294b06417b5cfefb254be2b79a129edf4d7a5cb56c5238146e06a85fcede8ca49083ff3ef1ce39092e45345757eb139b9ec0c237bfae6f1011923d80cc1cbe5031918f99d2e29ee0bee9b60b9b3937fcdb486b694b91a1284d17be522f4ce6da6a3f1a942717f2e69bddf49acadb22c009a860bda39e26a50de25955a63bde0f7eba58761c3d280ecb6523", 0xe3}, {&(0x7f0000000280)="72cc46fd3e8b74d4af5ecc69c56d69c8e043ce304f7c372b8b92b04752bb1a6d4dd9b43fea40904b690982812255a36c68af48ad4989bb5c7078796c80531a0274f6d5d69961e021909523be20e3014a7779926493c35c012892eba5b886ff2322e7c3a1386c68e304e956b51cb5d821facad1d7b00ba125b20e2f3a6757927df8cd4e0ebed2e25545286f73f5696422ae45658d7875cff38a6f3a61304365afd798070753f718deb4453ad92ae3a15e7d1cf6e2893d52db419ec473ec618b5a28db98bb468086df7503d9ae525aa7770cfeaf5e23b9f6d34b8e54e87ba39d7642589fe24f21b1679085dbed0df09ef7c705c9cc89a32f7ba3c3", 0xfa}, {&(0x7f0000000380)="92e6c7c3adc0dee059cc7a2ade2fbb18ac390de9ff", 0x15}, {&(0x7f00000003c0)="8463e8ad395c0ecb524abef9ce374a02fb0cc2673a67cec0294e324cc0120f68bca297ca8989bee341ecaf5e7463523f12051d7a474641e5bc6140b3cf458eb230844074795a3b97039cf178d0c4bbebf49a116f09713b55e473100c764e87d4cb0dd8c6818b165fc760c97ad1af579c014fed95b4c3f832c7377678982d4244213beffc7a858e26f3942409e4252787a73e005e7b2402507b404885fd34164eb094672dcd226a", 0xa7}, {&(0x7f0000000480)="98200b7daeb3352a4703d7e5b1023856554c52269ffcc2dc84da9a4ebb65ec6c455759780c14900b2fe8ba95fd484982291ad2db9e2040efeb71bfcb0f4565dbb29366c58b0349519f8cb555c253e1aea517f43f5078b33c6b5ae9c7e6c6b4e67009c447f8d3f3150510fa501b61fb9e3198640e52de2913fea80318", 0x7c}, {&(0x7f0000000500)="0471f3566973cd0c5bc83dd86be214897ccabfdc2fbbc95c4f2e2b45ac6a18e2b6d30df9cc841a2704339f41e320a901cb7d3446011337232026a41f50c4f66f52c1e9c0b638c8641777e24803ad6c0234c878c37ff8e1575ec0660f20434c4dc9ab6d4d6ec7a32543cb852039a671283d0b9e9c49b8ebe3a866924a21dc89509f6330499f6c83b7939850", 0x8b}, {&(0x7f00000005c0)="2040607663f1e32eb9555bdc5632114d0895b64e239a60e571df1721ac490e4424c90e1a8abce7f082e383959e231cc540adf959c122da2e96381fa431ab99", 0x3f}], 0x9, &(0x7f00000006c0)=[{0x50, 0x0, 0xfffffff8, "50284123df3cd780b0af86d0fe92b26e339719406d2bf36eb9236bb2cac6609365e3cbbefe71e08937475d739091a38483f0264c0783cc76bc22f317fc"}, {0x50, 0x111, 0x0, "787fba101595d6790c5b00c51751ef9fd39a6473087d0fb26dfc50ae72f4bfc54b6b91040f44e587600bed11ed45a19e82fcd01ff56afce2006b07e7ee59b2"}], 0xa0}, 0x90000) r3 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendmsg$sock(r3, &(0x7f0000000980)={&(0x7f00000007c0)=@caif=@rfm={0x25, 0x5, "aeb4011026db799af382680abd6aa9f0"}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="76752e9dee26b6e2c0a5e588eb4e69a382f93212f61fc57cd7a405421b8348ebd6d7331cdb28eeab23e2b3237e42ab767232cb23c1b9f56f73b56f42216da63685b06724070f94d2339948af97274eaa406603d9b81709bc9410841466741ef5195076601ebb3fe3e77c4137c125696becac2e58053f8c1a8815903747ffc1214b02a2ccbf5ea6060780c4e4a0b36429ce80771acf76a59827065e23523a932904acd3fc63ea717000bbb240f73f58b6e3918378a4a0483c05337bbcf9b6", 0xbe}, {&(0x7f0000000900)="5e27fd73378f04d7063a9747ea39ad2ad36fd67a44ff25e5f9", 0x19}], 0x2}, 0x10000080) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r6, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r6, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r7 = perf_event_open(&(0x7f0000000080)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1a4377f6180d4a2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) r9 = dup2(r7, 0xffffffffffffffff) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r9, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x80500}, 0xc, &(0x7f0000000680)={&(0x7f0000000580)={0xc4, r10, 0x100, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x400}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x96e4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xdc11}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff3e64}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0xc4}, 0x1, 0x0, 0x0, 0xc4}, 0x8800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a40)={0x0, @loopback}, &(0x7f0000000a80)=0xc) r12 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_selinux(r12, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) getsockopt$inet6_mreq(r12, 0x29, 0x1b, &(0x7f0000000b80)={@local, 0x0}, &(0x7f0000000bc0)=0x14) sendmsg$nl_route(r9, &(0x7f0000000cc0)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1120000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000f80)=ANY=[@ANYBLOB="4c0000001900040029bd7000fddbdf251d01060008000d000300000008000500030002b018000100010000a004020000839214234559eccc0200000008000a00", @ANYRES32=r11, @ANYBLOB="da7587883ec9d90ad1ebc966fcf9b55cf8b9b481811c134f0eb12f02077b4f596e6f0b23d3690bc33b63f3cee1cfcdfd15872b282ae01a5e9258f07b7efe9c3d6e8147cea726a838e5b0a55c0c16e263bdf3e8ae89b08c5da4687953626fb64cf2f563e8c531a2f18dcfeccfa2cf19f90d10e4c67d653b3183dd70ee794b4f81a6fabf246291614dc4432d14f66c157056fadcfe66533171f78b98", @ANYRES32=r13], 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x800) sendmsg$IPVS_CMD_FLUSH(r9, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x90208000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xcc, r10, 0x32, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400000}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6}}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6e}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40000044}, 0x40044) sendmsg$IPVS_CMD_GET_DAEMON(r6, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x78, r10, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5d4f13eb}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffff000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x78}}, 0x40000) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000040)) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:20 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="f800e44fb40e8a9ad15159c192bb129947d5685d95839d8d903e767ec59602a0677b54cd1b6db80032b5bff09564b7514b8b7914d19f238af5a41d82d5950692a50910df0ee214589db040341a0206a3ab33a3d3b45da3db33f2ba24dba273038f5f0afdc30075d2bee3933a236f12f0508905245156eedaa3c6576c525a17c14ad9e8edbfd03297d6a236f49cfafb377201088e61d5cdf1267fd30bc700a053bdd9a20dceb485ae0f436edd168ec61efce5dcc435ed79e4a44b637b84d4aad20dcfab100722d5e282a28a90079c1e568cd326c7011a775b8c27edb7e8312168e99f83", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}}, 0x0) read(r2, &(0x7f0000000000)=""/4, 0x4) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0xbf) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:20 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000140)={{0x1, 0x0, @reserved="bdaab6333df1df3dfc4aa8edf1962468757bf3b3e687e42b49b05131ab61fd6d"}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r3 = socket$packet(0x11, 0x2, 0x300) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x40, 0xe, 0x81, "b6c587e4a7646b8d73f2b4eed4e0a819", "e66b6b1c13e9399cc1a7042c3a8ad85abde0d0e16e651f1e17c55d1ecbb07a3c6bafb71dee117c34577fa8"}, 0x40, 0x4) ioperm(0x2, 0x76d, 0x77e3) 06:44:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) [ 364.501446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3764 sclass=netlink_route_socket pig=15777 comm=syz-executor.5 06:44:21 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594", 0xd7}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:21 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000040)) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:21 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) [ 365.367558] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3764 sclass=netlink_route_socket pig=15798 comm=syz-executor.5 06:44:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e4", 0x27}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:21 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = accept$packet(r4, &(0x7f0000000000), &(0x7f0000000040)=0x14) r6 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r6, 0x0) bind$unix(r6, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r6, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x0, 0x8, 0xa, 0x0, 0x0, [{r1, 0x0, 0x19}, {r2, 0x0, 0x10000}, {r5, 0x0, 0x7}, {r1, 0x0, 0x9400000000000000}, {r0, 0x0, 0x4}, {0xffffffffffffffff, 0x0, 0x4}, {r1, 0x0, 0x8}, {r6, 0x0, 0x5}, {r0, 0x0, 0xf14d}, {0xffffffffffffffff, 0x0, 0xe5}]}) r7 = fcntl$dupfd(r2, 0x0, r2) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r7, 0x400454ce, r8) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x8000, 0x10) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r6, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockname$packet(r8, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r10 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r9, 0x1b, r10, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockname$packet(r12, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r14 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r13, 0x1b, r14, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) getsockname$packet(r16, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) accept$packet(r16, &(0x7f0000000140)={0x11, 0x0, 0x0}, &(0x7f0000000180)=0x14) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) r19 = fcntl$dupfd(r18, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) getsockname$packet(r19, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r19, 0x29, 0x23, &(0x7f0000000300)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) r22 = fcntl$dupfd(r21, 0x0, r21) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) getsockname$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r24 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r23, 0x1b, r24, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) r26 = fcntl$dupfd(r25, 0x0, r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) getsockname$packet(r26, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r28 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r27, 0x1b, r28, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000440)=0xc) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) r31 = fcntl$dupfd(r30, 0x0, r30) ioctl$PERF_EVENT_IOC_ENABLE(r31, 0x8912, 0x400200) getsockname$packet(r31, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r33 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r32, 0x1b, r33, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r34 = socket$unix(0x1, 0x400040000000001, 0x0) r35 = dup3(0xffffffffffffffff, r34, 0x0) ioctl$KDDELIO(r35, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r35, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) ioctl$ifreq_SIOCGIFINDEX_team(r35, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) r37 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r37, 0x0) bind$unix(r37, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r37, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r37, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) r39 = socket$inet6_tcp(0xa, 0x1, 0x0) r40 = fcntl$dupfd(r39, 0x0, r39) ioctl$PERF_EVENT_IOC_ENABLE(r40, 0x8912, 0x400200) getsockname$packet(r40, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r42 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r41, 0x1b, r42, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000006c0)=0xe8) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) r45 = fcntl$dupfd(r44, 0x0, r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) getsockname$packet(r45, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r47 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r46, 0x1b, r47, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000700)={'vxcan0\x00', 0x0}) r49 = socket$inet6_tcp(0xa, 0x1, 0x0) r50 = fcntl$dupfd(r49, 0x0, r49) ioctl$PERF_EVENT_IOC_ENABLE(r50, 0x8912, 0x400200) getsockname$packet(r50, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r52 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r51, 0x1b, r52, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r53 = socket$inet6_tcp(0xa, 0x1, 0x0) r54 = fcntl$dupfd(r53, 0x0, r53) ioctl$PERF_EVENT_IOC_ENABLE(r54, 0x8912, 0x400200) getsockname$packet(r54, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r56 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r55, 0x1b, r56, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) r58 = socket$inet6_tcp(0xa, 0x1, 0x0) r59 = fcntl$dupfd(r58, 0x0, r58) ioctl$PERF_EVENT_IOC_ENABLE(r59, 0x8912, 0x400200) getsockname$packet(r59, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r61 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r60, 0x1b, r61, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001780)={0x0, @broadcast, @initdev}, &(0x7f00000017c0)=0xc) r63 = socket$inet6_tcp(0xa, 0x1, 0x0) r64 = fcntl$dupfd(r63, 0x0, r63) ioctl$PERF_EVENT_IOC_ENABLE(r64, 0x8912, 0x400200) getsockname$packet(r64, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r66 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='\x00\x00\x00\x00\x00\b\x00', 0x200800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r65, 0x1b, r66, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r67 = socket$inet6_tcp(0xa, 0x1, 0x0) r68 = fcntl$dupfd(r67, 0x0, r67) ioctl$PERF_EVENT_IOC_ENABLE(r68, 0x8912, 0x400200) getsockname$packet(r68, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r70 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r69, 0x1b, r70, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) accept4$packet(r0, &(0x7f0000001840)={0x11, 0x0, 0x0}, &(0x7f0000001880)=0x14, 0xd2da10733c728c5e) r72 = socket$unix(0x1, 0x400040000000001, 0x0) r73 = dup3(0xffffffffffffffff, r72, 0x0) ioctl$KDDELIO(r73, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r73, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) getsockname$packet(r73, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001900)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000021c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc00a000}, 0xc, &(0x7f0000002180)={&(0x7f0000001940)={0x824, r2, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8}, {0x1b4, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r27}, {0xf4, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xea4}}, {0x8, 0x6, r29}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4b}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r32}}, {0x8}}}]}}, {{0x8}, {0x104, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6d4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r36}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r38}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r41}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x89}}, {0x8}}}]}}, {{0x8, 0x1, r43}, {0x80, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r46}}}]}}, {{0x8}, {0xf4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r48}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r51}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r55}}}]}}, {{0x8, 0x1, r57}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r60}}, {0x8}}}]}}, {{0x8, 0x1, r62}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r65}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r69}, {0xf8, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r71}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r74}}}]}}]}, 0x824}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040055) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r75, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:22 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594", 0xd7}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8a1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x711, 0x70bd29, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0xffffffff]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0c0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8080, 0x6, 0x8000, 0x6}, 0xfffffffffffffcb2) 06:44:22 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:22 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:22 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) capset(&(0x7f0000000100)={0x20071026, r5}, &(0x7f0000000140)={0x3, 0x6970c8ee, 0x800000, 0x8, 0x2, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e4", 0x27}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$9p(r0, &(0x7f0000000100)="3e47dee83c6f80a56ce78188f0d6b76a0a1eee2eb81bbd4d5a9242b8012b1e138669b54975e9a06d0399daf92f29361129c42b1f7e650041ff692734cdc49d56eb0a9dedcfec585735e47f6dc750278c1478e4d919b3bd140eb5a47875d84b62aea955b0f8d3750c2aa6a8ebe61edcbad2a083910d4b34458a778676f263fa9e6913c94452d22764b90be6bdc51ea13e14c3fc93ebf64a16f68335c436756181d5790c4c1c0ad17ed140c4ea42d1e0cad17662c25a223c38e488a489f40e90043dd0158abe84de9175c6c06002cf2954f656dda44ebae9c5", 0xd8) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) r3 = gettid() getpriority(0x1, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x0, &(0x7f0000000600)=ANY=[], &(0x7f0000000680)='9\xdc\xc91\x05\x91R\xe1\x8ci\xab\x15\nU\x8d\x05\x85\xc2\x01\xb1f?s\xf9v\xb7Q\xa0x\x1e\x10O_\xbd\xab\x95?>\xc8\xe8\bE\x84\xcdh\x84\x1a\x80\xc3:\xa7\x83\xe42oMx\x86d\x1e\xea\xe2\xf9>\xbb\n-_\xf3\xfb\x8b\xa6\x18\x91\xbf5p\xb6\x15\x12\xad\xf1\xa5\xfb\xee\xc4\x99k7v\xa9\x13\xf2\xc2\'4\xb3\xd5\xd1\xd6\xa3\xfa\xb4\xe5\x88\xd3\xe3\xfc\xdf\x9c\xe6\xba\xb7q#C\xfe\xef\x14\xe1\xf7)\x8b\x94!\x90EM\x8e\xc7J\xbf;~\x8ad\xdc\xb7\n\xfa\xf7@i\x04\x85\xc8pG%gO\xf7\xdcJ\xcf\xfe\xb5\xb2\xdb\xe1\xa89\xa5;', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r7, 0x1b, r8, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r8, &(0x7f00000002c0)={0x11, 0xc, 0x0, 0x1, 0xef}, 0xffffffffffffffd4) r9 = fcntl$dupfd(r4, 0x80c, r1) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$packet(r9, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r11 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x4b0202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0xc, [], r10, 0x1b, r11, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r11, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, r11, 0x0, 0x6, &(0x7f0000000040)='stack\x00', r12}, 0x30) ioperm(0x2, 0x76d, 0x77e3) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v1={0x1000000, [{0x10001, 0x7}]}, 0xc, 0x1) 06:44:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) init_module(&(0x7f0000000000)='\x00', 0x1, &(0x7f0000000040)='selinux()proc\x00') ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x47739812e35164b1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r5, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x40}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x40}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x18000) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x80000000, 0x0, 0x3a, 0x5}, 0x10) 06:44:22 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bc", 0xda}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x400040000000001, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r6, 0x1b, r7, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r7, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, &(0x7f0000000000)=0x1) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$packet(r9, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r11 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r10, 0x1b, r11, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r11, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r12 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r12, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(0xffffffffffffffff, &(0x7f0000000100)=@un=@abs={0x0, 0x0, 0x4e21}, 0x126) r13 = fcntl$dupfd(r1, 0x80c, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x2}, 0x1c) 06:44:23 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ustat(0x2, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() getgid() getpriority(0x1, r3) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000040)={0x8}) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f00000001c0)=""/239) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x7}, 0x1c) 06:44:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e4", 0x27}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:23 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/uts\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c00000a000000000000000000000000160000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000300)={0x2e9e, 0x3, 0x2, 0x838e, 0x5, [{0x0, 0x5, 0x80000000, 0x0, 0x0, 0x400}, {0x10000, 0x5, 0xa037, 0x0, 0x0, 0x4}, {0x1b8f, 0x92, 0x20, 0x0, 0x0, 0x81}, {0x4, 0x9c6, 0x5}, {0x7, 0xffffffff, 0x5, 0x0, 0x0, 0x1000}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:23 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpid() fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x0, r1}) fcntl$getownex(r0, 0x10, &(0x7f00000031c0)) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x3, 0xe}, @sack_perm], 0x1c1) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$IOC_PR_REGISTER(r5, 0x401870c8, &(0x7f0000000000)={0x31, 0x8e, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$packet_int(r2, 0x107, 0x17, &(0x7f0000000080)=0x2, 0x3) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:23 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bc", 0xda}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:24 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x18, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0xfffffeff}, 0x1c) 06:44:24 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) fsync(0xffffffffffffffff) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2400000000000) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0xffffffff) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r4, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$setsig(r4, 0xa, 0x2f) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 06:44:24 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b2", 0x3b}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = fcntl$dupfd(r3, 0xe09, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:24 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bc", 0xda}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:24 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x10008, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYRESHEX=r1, @ANYRES32=r2, @ANYBLOB='\x00'], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioperm(0x2, 0x76d, 0x77e3) 06:44:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x41) poll(&(0x7f0000000100)=[{r3, 0xc000}, {r4, 0x200}, {0xffffffffffffffff, 0x6}, {r5, 0xc102}], 0x4, 0x800) 06:44:24 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$unix(0x1, 0x400040000000001, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$KDDELIO(r4, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x3, 0x4, 0x3000}, 0x4) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$EVIOCGNAME(r6, 0x80404506, &(0x7f00000001c0)=""/177) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b2", 0x3b}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r5, 0x4, 0x46a00) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockname$packet(r7, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r10, 0x732, &(0x7f0000000540)) r11 = socket$unix(0x1, 0x400040000000001, 0x0) r12 = dup3(0xffffffffffffffff, r11, 0x0) ioctl$KDDELIO(r12, 0x4b35, 0x2) r13 = socket$unix(0x1, 0x400040000000001, 0x0) r14 = dup3(0xffffffffffffffff, r13, 0x0) ioctl$KDDELIO(r14, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r14, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r15 = socket$unix(0x1, 0x400040000000001, 0x0) r16 = dup3(0xffffffffffffffff, r15, 0x0) ioctl$KDDELIO(r16, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r16, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) ioctl$ION_IOC_HEAP_QUERY(r16, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) io_submit(r10, 0x1, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x2, 0xffffffffffffffff, &(0x7f0000000200)="8c9419c30bd4dbbd776c62abe3a4fc3c964abe0d9a949209019291a7c20ddb2f2c679fce904b351b784cd984c80cc2952c7f3a1f7f9e086d2b80733c21719433c9746d5e40ad5a74ee8d736b503e34fe703762206d8eddca4b8fedb08b862115570da7341b91e94404b7580c2ee9cd2bb8b61b01b01d922df597d372b81f6fa23631b32013abf407ce831eab5ed786904aab166506", 0x95, 0x4, 0x0, 0x0, r12}]) r17 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x72, &(0x7f0000000100)=""/114, 0x41000, 0x1, [], r8, 0x1b, r17, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x101f}, 0x10}, 0x70) bind$packet(r17, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$TIOCSCTTY(r17, 0x540e, 0x1) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r18 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2000, 0x0) signalfd(r18, &(0x7f0000000040)={0xa10}, 0x8) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 06:44:25 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c", 0xdc}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:25 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1000, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000100)=[0x6, 0x8]) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:25 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r3 = dup(r0) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x4, 0x8000, 0x6}, 0x1c) 06:44:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000040)={@multicast1, @empty}, &(0x7f0000000100)=0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockname$packet(r7, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r8, 0x1b, r9, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r9, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) getsockname$packet(r9, &(0x7f0000000140), &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r4, 0x1b, r5, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$TIOCGPKT(r5, 0x80045438, &(0x7f0000000000)) r10 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x6, 0x8}, 0x1c) 06:44:26 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c", 0x3a}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:26 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r5, 0x0, 0x0, 0x110003) lseek(r5, 0x0, 0x3) r6 = syz_genetlink_get_family_id$team(0x0) r7 = open(&(0x7f0000000400)='./bus\x00', 0x40, 0x1c4) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r8}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r8}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@local, @loopback, r8}, 0xc) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r9, r9, 0x0, 0xdd) getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r10}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r10}, 0x14) setsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @multicast2, r10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup2(r13, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x17100010}, 0xc, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES16=r6, @ANYRES64=r15, @ANYRES32=r4, @ANYBLOB="9000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ff7f0102020000000500000700000000abed021f0000000008000100", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r11, @ANYRES64=r12, @ANYRESHEX=0x0], @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r8, @ANYBLOB="b800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005b4800003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="000102004000017bc20001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462716c010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002bdb00", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040080000202008000000600070601"], 0xf}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) r17 = fcntl$dupfd(r16, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) getsockname$packet(r17, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r19 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r18, 0x1b, r19, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r20 = socket$inet6_tcp(0xa, 0x1, 0x0) r21 = fcntl$dupfd(r20, 0x0, r20) ioctl$PERF_EVENT_IOC_ENABLE(r21, 0x8912, 0x400200) getsockname$packet(r21, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r23 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r22, 0x1b, r23, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r24 = socket$inet6_tcp(0xa, 0x1, 0x0) r25 = fcntl$dupfd(r24, 0x0, r24) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) getsockname$packet(r25, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r27 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r26, 0x1b, r27, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r28 = socket$inet6_tcp(0xa, 0x1, 0x0) r29 = fcntl$dupfd(r28, 0x0, r28) ioctl$PERF_EVENT_IOC_ENABLE(r29, 0x8912, 0x400200) getsockname$packet(r29, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) getpeername$packet(r29, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r31 = socket$unix(0x1, 0x400040000000001, 0x0) r32 = dup3(0xffffffffffffffff, r31, 0x0) ioctl$KDDELIO(r32, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r32, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) getsockopt$inet_pktinfo(r32, 0x0, 0x8, &(0x7f0000000140)={0x0, @dev, @multicast1}, &(0x7f0000000180)=0xc) r34 = socket$inet6_tcp(0xa, 0x1, 0x0) r35 = fcntl$dupfd(r34, 0x0, r34) ioctl$PERF_EVENT_IOC_ENABLE(r35, 0x8912, 0x400200) getsockname$packet(r35, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r37 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r36, 0x1b, r37, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast2, @local}, &(0x7f0000000340)=0xc) r39 = socket$inet6_tcp(0xa, 0x1, 0x0) r40 = fcntl$dupfd(r39, 0x0, r39) ioctl$PERF_EVENT_IOC_ENABLE(r40, 0x8912, 0x400200) getsockname$packet(r40, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r42 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000f70f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r41, 0x1b, r42, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'bcsh0\x00', r41}) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) r45 = fcntl$dupfd(r44, 0x0, r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) getsockname$packet(r45, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r47 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r46, 0x1b, r47, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r47, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) accept$packet(r47, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) accept4$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14, 0x800) r50 = socket$inet6_tcp(0xa, 0x1, 0x0) r51 = fcntl$dupfd(r50, 0x0, r50) ioctl$PERF_EVENT_IOC_ENABLE(r51, 0x8912, 0x400200) getsockname$packet(r51, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r53 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r52, 0x1b, r53, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r54 = socket$unix(0x1, 0x400040000000001, 0x0) r55 = dup3(0xffffffffffffffff, r54, 0x0) ioctl$KDDELIO(r55, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r55, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) getsockopt$inet_mreqn(r55, 0x0, 0x24, &(0x7f0000000500)={@loopback, @initdev, 0x0}, &(0x7f0000000540)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000780)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000000e40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000e00)={&(0x7f00000007c0)={0x610, r6, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r18}, {0x1e4, 0x2, [{0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x8, 0x2, 0x6, 0x5}, {0xfc, 0xff, 0x20}, {0x8, 0x7f, 0xfe, 0x5}, {0xaff7, 0x4e, 0x7f, 0x9801}, {0x3f, 0x57, 0xff, 0x8}, {0x5, 0x20, 0x7, 0x564a}, {0x400, 0x2, 0x4, 0x1}, {0x45dd, 0x6, 0x2, 0x1ff}, {0x0, 0x2, 0x1, 0xffffffff}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r22}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r26}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x78806ac2}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r33}, {0x1c0, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r36}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x35d}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r38}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r43}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r48}, {0x14c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r49}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r52}, {0xec, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r56}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r57}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r58}}}]}}]}, 0x610}}, 0x2000000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x3) 06:44:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b2", 0x3b}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:26 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fsync(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) get_thread_area(&(0x7f0000000040)={0x5, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1}) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000100)=0x1, 0x1) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x7ffd, 0xfc1, 0x7fff, 0x6, 0x81, 0x3, 0x3f1}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r6, 0x1b, r7, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r7, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f0000000080)="b4e9c1116e2780bd5f364309bd5474cb", 0x10) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000000)) 06:44:26 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c", 0xdc}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockname$packet(r8, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r10 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r9, 0x1b, r10, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r10, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xf, 0x1, &(0x7f0000000180)=ANY=[@ANYRES64=r6], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r4, 0x1b, r10, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x20}, 0x10}, 0x70) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) write$P9_RRENAMEAT(r5, &(0x7f00000002c0)={0x7, 0x4b, 0x2}, 0x7) r11 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getrlimit(0xa, &(0x7f0000000280)) r12 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) vmsplice(r12, &(0x7f0000000040)=[{&(0x7f0000000100)="b7ab133ac9f97bab15f5466db66b816e10f4d892c72b5c08927f14498c7c8dfed2de109a7740fde5737a11f7231cf68df2aedb4dda6b66f732292beb237548672c318271f0820ba56302", 0x4a}, {&(0x7f0000000180)="7acfcc548920dcab027203e8890447975371e928353c63740664052deb7927803cd9de638e73f596b5960ae171b75a61dc6ec5168039778df96bad88ccc559e94113f745d66eeaca6948bf20876460f636088f044570880fd4b137e8df18fdb4be0c1445828201dac5f2646fa324a535262e02bea2f87fd059cfe98d06fac774a606ee632d11a959a9aa8c24e1d5c8e75398a280066e493838c5fa2cabbe412be8be6c6552bde4bb15966676f2358b5fd6243ec7c7424599e0b02652a1c53a576c0efbe084c6fc0612ed0aa446922a", 0xcf}], 0x2, 0x3) 06:44:26 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="5db3b48e3b7c59e13a46ff7a2cc44d8a1027e40bd4e419c3be6d91d322372210e5e9659b07001125686322d777d410f842d410b7d976cf5c88ca9a8382946f911eab297218e2203419d7eaac26c303a409ed8379ef01ea9ec5fa292cea4cbd62ee"], 0x3}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r3, &(0x7f0000000100)="f3c7a1ee57ff634c90d683e7ebd593033d50a9e0127cf069e49cb8012ee07c5cdfc7d2c5db7232270a7e6617e2dc7c1e4cd5fcd5956fb12312f9fc758fe14347f515f38ced952fae81869feec4236eb40f298a9b690aab3fbe9cbd27acfae4f2d69bdc73ef16487f204b908ea9626fd9af32f36e902459a79f3b45904a8423b9686c94ec6259a98976e0fd26d33c3c129e6c20b2f2bc44c5ad3b57bce683b5dfaea76d485392cebf387976f1e41b4c5e067b2edb4e15203e3ad24368551874ae5cd47a2326a47bb5defb1762d18b9dfffe7b969425a73c722a64ac", &(0x7f0000000240)=""/16}, 0x20) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:27 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c", 0x3a}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r6, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r6, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r6, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r7, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x1004c001) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r8 = socket$unix(0x1, 0x400040000000001, 0x0) r9 = dup3(0xffffffffffffffff, r8, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r10, 0x800c6613, &(0x7f00000003c0)=@v2={0x2, @aes256, 0x1, [], "ad364943f1b4198f397c8b4c7d2e955b"}) ioctl$KDDELIO(r9, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r9, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r11 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r11, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x401880}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x68, r12, 0x2, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xa005}, 0x4) sendmsg$TIPC_CMD_GET_NETID(r9, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r12, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x8000) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea9127", 0x45}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:27 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c", 0xdc}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r0, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r4, 0x1b, r5, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r0, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r0, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c", 0x3a}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:28 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe800000d0ce9b79190cf0f3d271db8ab639651732eebbe2a71e04e345d24635e9258dc53acc9f7e6d28681f14fb8f59d4ad94651acbce47e93c60f52f7393a1022a0bb3105f787b919cb1fe2ec87697210b56358f22af0ad441"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea9127", 0x45}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:28 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001136ea00ffffffff35001000000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r2, 0x1b, r3, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r3, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) write$eventfd(r3, &(0x7f0000000100)=0x7, 0x8) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4204, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockname$packet(r7, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r8, 0x1b, r9, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r9, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$RTC_ALM_SET(r9, 0x40247007, &(0x7f0000000200)={0x3a, 0x2e, 0x4, 0x15, 0x8, 0x4, 0x2, 0x6c}) r10 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) r11 = fcntl$dupfd(r5, 0x0, r10) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000140)={{0xfffffffffffffffd, 0x2, 0xc3, 0x0, 0x3f}}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x1, 0x300) r1 = gettid() getpriority(0x1, r1) prlimit64(r1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x8}, 0x1c) 06:44:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r3, 0x1b, r4, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$UI_SET_SNDBIT(r4, 0x4004556a, 0x5) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0b", 0x57}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000080)=0x9, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r5, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x401880}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x68, r6, 0x2, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xa005}, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r6, 0x0, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 06:44:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea9127", 0x45}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x10008, 0x9f, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffbfffff, 0xffffffffffffffff, 0x8) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) lseek(r2, 0x80000001, 0x4) ioperm(0x2, 0x76d, 0x77e3) 06:44:29 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000100)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r3, 0x5, r4, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r7, 0x1b, r8, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r8, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$FS_IOC_GETFSMAP(r8, 0xc0c0583b, &(0x7f0000000600)=ANY=[@ANYBLOB="0000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000010001f00000000000000ffffff7f000000000200000000000000050000000000000000000000000000000000000000000000000000000000000003000000b5fe00000100000000000000b0000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e3ffffffffffffff00"/640]) bind$packet(r4, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000000)={0xe0e9203ad824af89, 0x2, 0x1, 0x2, 0x3}) getegid() r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RXATTRCREATE(r10, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x6040a2bf2e5392ab, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:29 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0b", 0x57}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:30 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r2, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) fcntl$setflags(r2, 0x2, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000100)=0x6e, 0x80000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) 06:44:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a9", 0x4a}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:30 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:30 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x1, &(0x7f0000000340)=ANY=[@ANYRES64=r0], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41100, 0x1, [], r4, 0x1b, r5, 0x8, &(0x7f0000000380)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x6, 0xa, 0x1f}, 0x10}, 0x70) r6 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r6, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r6, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80100, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) r9 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r9, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r9, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ppoll(&(0x7f0000000100)=[{r6, 0x2000}, {r2, 0x200}, {r7, 0x4e75464ea2e6099b}, {r8}, {r9, 0x4000}], 0x5, &(0x7f0000000200)={r10, r11+10000000}, &(0x7f0000000300)={0x5}, 0x8) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$EVIOCSABS2F(r5, 0x401845ef, &(0x7f0000000000)={0xffff, 0x7f, 0xd342, 0x2, 0x34f, 0x2000000}) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) finit_module(r8, &(0x7f0000000180)='\x00', 0x2) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0xffffffff, 0x6, 0x0, 0x400, 0xfffffffe}, 0x1c) 06:44:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x20}, 0x1c) 06:44:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0b", 0x57}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000000000000ff0ff9dc550040858000026400000011260000ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r4, 0x1b, r5, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r7 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r7, 0x0) bind$unix(r7, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r7, 0x0) r8 = socket$unix(0x1, 0x400040000000001, 0x0) r9 = dup3(0xffffffffffffffff, r8, 0x0) ioctl$KDDELIO(r9, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r9, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r10 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r10, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r10, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0x166, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r1], @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR, @ANYBLOB="a3a2d007c009826c7989ca83217873630a7a59bc596d7388b7380b92e5120d71397c56d085f30f2101bca27e7faf706e3118f9aecbbaf8df6ed7e7022bf45e1f409ba46f50a1154bc8f32648815d56aec5575f205450523ccb493bfaa584a3344415c74bca27e47b11093b7d4829fc1fb98f922b211ee8e845b849b6389980a2ce96804135ce0a7ab90d5c94b6de6f1b4c9448aec5af00f86ca95f2e29484aee222831f094304bf839a3579dac4ff66c0ca6354fbee31b49fa7679e0b6b666038d47e0ff08e932f01cba45d947", @ANYRES32=r5, @ANYRES16=r6, @ANYRESHEX=r0, @ANYRES16=r1, @ANYRESDEC, @ANYRES64, @ANYPTR64, @ANYRESHEX=r7], @ANYBLOB="9ef3838d8b9b43b2e2a3a7fad98aea03", @ANYRESHEX=0x0, @ANYPTR64, @ANYRESOCT=r10, @ANYRESDEC=r9, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES64=0x0, @ANYRESOCT, @ANYRES64=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="b036824000f0e210e6168dea1d538370a846938b0df8ddfd2d30c47d1b62b7f8e9e023c7161bac660bd3fa1ac2cd70e7cbdcb70be309da2fc63a221691045dd98428c187b2721482b684597918da040621348797e89e011c1bd884110f8e57e3c4cc0253dc82c804904f9fb8d5596c41682e5c4e55e1b9d0956215a67a7d4cf8a16b76857ddf4861f3f0c31390ecaf74ff496ee743bd128053a0a61d805dcba8f1b6fc196231680ad15a59c7f279012ca0b8f7796edf0501029be17c6553db08a3265b29da35481e5dfc2bbbd417176290651ecbf101c3555d7a201fe584271927c1a08a8a", @ANYPTR], @ANYRESOCT], @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x32e8518af82d19b6, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$unix(0x1, 0x400040000000001, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$KDDELIO(r5, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) connect$unix(r5, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a9", 0x4a}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:31 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r0, 0xc0a, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:31 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{0x0}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0xf3cfb7de16191526) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r6, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r6, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockname$packet(r8, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) renameat2(r6, &(0x7f0000000140)='./file0/file0\x00', r8, &(0x7f0000000180)='./file0\x00', 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f610500020000e8fe02080100010800080003000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:31 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599", 0x66}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) [ 375.308250] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 06:44:31 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="1400001f000000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$TIOCCBRK(r1, 0x5428) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x7) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x4}, 0x1c) 06:44:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a9", 0x4a}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x283, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x2bf, 0x6743, 0x80000001}, 0x10) 06:44:32 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{0x0}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000100)=""/4096, &(0x7f0000000040)=0x1000) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:32 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599", 0x66}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:32 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100), 0x10) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0xf57, @dev={0xfe, 0x80, [], 0x2a}, 0x5f}, 0x1c) r4 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:32 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x1ff, 0x4, &(0x7f0000000480)=[{&(0x7f0000000140)="768fb16f87b0064bf9e859916c3376ceaec384d519943bba9452d970b535d163c4776bf760de1c22e91bacd93741feea0601655d08a2dc0cfe5eda9983", 0x3d, 0x4}, {&(0x7f0000000300)="e22448761867fe181b6d06662061eb7d56bd7253cf9afa2edc4505035df2779392e03ec8a2fa7d067421a210f52e12e4ed1a68c37d4520fa92d05ec33c5b0150e6bb6fca5640fc008cde345f38fd1420801c0505269fbf7c3c8c3b9d05633e4efbb5943d646b9cee3f073b5ad2b2e8886e523c73c5fd7ad5d23be9f5c41c6c92eb106f98c0be6fd0427d28354e9747219faf386e93484ac08924e4283a68256dfecee38f5605078194fc6d7926945ed1e3f09cd730a8f60889e78b8e22adc6a3093e677d22ea49a8ae1dd9c02a52401eba05e71bb670ca", 0xd7, 0x8}, {&(0x7f0000000180)="cee1ab282791a057f9b9b67a3fddfc58dc24a04438d095c221b6b96897c87a42c283b51d3df186f943469c21489ef96057988247da327c3b86ad40791db7043809d9fdc23cfe1f05c6dcf3719e902728d4d33e3a5940ff1dbaa33ad0d51f", 0x5e, 0x80}, {&(0x7f0000000400)="76d62f1c23b942c5cb6d5a981358cbefec4b9810bac562b1eba8dffe0f687e2b51f71ac3128aab152f6e7dc23011617f68e85cd139e0b0dacc167ad17d0470fe36a3e898708dd406fe679d55db9a80cf37466086987f455751523b4cea3930a9fe4f217097be222e17", 0x69, 0xaa25}], 0x80, &(0x7f0000000500)={[{@nodots='nodots'}, {@fat=@errors_continue='errors=continue'}, {@fat=@flush='flush'}, {@dots='dots'}, {@dots='dots'}, {@dots='dots'}], [{@appraise_type='appraise_type=imasig'}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) [ 376.599033] FAT-fs (loop2): Unrecognized mount option "appraise_type=imasig" or missing value 06:44:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a92388", 0x4c}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:33 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{0x0}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:33 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000000)={0x0, 0x0, 0x65}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) pipe(&(0x7f0000000140)={0xffffffffffffffff}) read(r6, &(0x7f0000000000)=""/250, 0xedf1d44) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') pipe(&(0x7f0000000140)={0xffffffffffffffff}) read(r8, &(0x7f0000000000)=""/250, 0xedf1d44) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f00000001c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f00000001c0), 0xfffffef3) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r14 = socket(0x1, 0x803, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r15}]]}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r10, 0x8933, &(0x7f0000000300)={'team0\x00', r13}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xfe16) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r18, 0x0, 0x0, 0x110003) lseek(r18, 0x0, 0x3) r19 = syz_genetlink_get_family_id$team(0x0) r20 = open(&(0x7f0000000400)='./bus\x00', 0x40, 0x1c4) getpeername$packet(r20, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r21}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r21}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@local, @loopback, r21}, 0xc) r22 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r22, r22, 0x0, 0xdd) getpeername$packet(r22, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r23}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r23}, 0x14) setsockopt$inet_mreqn(r20, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @multicast2, r23}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r25 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r28 = dup2(r26, r27) ioctl$PERF_EVENT_IOC_ENABLE(r28, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_GET(r18, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x17100010}, 0xc, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES16=r19, @ANYRES64=r28, @ANYRES32=r17, @ANYBLOB="9000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ff7f0102020000000500000700000000abed021f0000000008000100", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r24, @ANYRES64=r25, @ANYRESHEX=0x0], @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r21, @ANYBLOB="b800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005b4800003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r23, @ANYBLOB="000102004000017bc20001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462716c010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002bdb00", @ANYRES32=r17, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040080000202008000000600070601"], 0xf}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r29 = socket$nl_route(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r32 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r32, 0x0, 0x0) getsockname$packet(r32, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002a80)=@newlink={0x60, 0x10, 0x40d, 0x3, 0x0, {0x0, 0x0, 0x0, r31}, [@IFLA_LINKINFO={0x40, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x34, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @loopback}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x5}, @IFLA_VTI_LINK={0x8, 0x1, r33}, @IFLA_VTI_IKEY={0x8, 0x2, 0x9}, @IFLA_VTI_OKEY={0x8, 0x3, 0x4}]]}}}]}, 0x60}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r35, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f0000000380)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000480)=0xe8) r37 = socket$netlink(0x10, 0x3, 0x0) r38 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r38, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r38, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r40 = socket(0x1, 0x803, 0x0) getsockname$packet(r40, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r37, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r39}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r41}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000600)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r6, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8800000}, 0xc, &(0x7f0000000640)={&(0x7f0000000840)={0x2f8, r7, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r9}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r16}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4f0}}}]}}, {{0x8, 0x1, r21}, {0x13c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}]}}, {{0x8, 0x1, r36}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r41}, {0x80, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r42}}}]}}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x20008000}, 0x41001) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r44 = socket$inet6_tcp(0xa, 0x1, 0x0) r45 = fcntl$dupfd(r44, 0x0, r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) getsockname$packet(r45, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r46, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r47 = socket$inet6_tcp(0xa, 0x1, 0x0) r48 = fcntl$dupfd(r47, 0x0, r47) ioctl$PERF_EVENT_IOC_ENABLE(r48, 0x8912, 0x400200) getsockname$packet(r48, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r50 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="00fc09000000000000000000ff0f7b0085780000640000001126ea95000000fa16f144"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r49, 0x1b, r50, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r51 = socket$inet6_tcp(0xa, 0x1, 0x0) r52 = fcntl$dupfd(r51, 0x0, r51) ioctl$PERF_EVENT_IOC_ENABLE(r52, 0x8912, 0x400200) getsockname$packet(r52, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r52, 0x8933, &(0x7f0000001540)={'team0\x00', 0x0}) r54 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r54, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r54, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) recvmsg(r54, &(0x7f0000001880)={&(0x7f0000001640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000001780)=[{&(0x7f00000016c0)=""/12, 0xc}, {&(0x7f0000001700)=""/101, 0x65}], 0x2, &(0x7f00000017c0)=""/137, 0x89}, 0x20) r56 = socket$inet6_tcp(0xa, 0x1, 0x0) r57 = fcntl$dupfd(r56, 0x0, r56) ioctl$PERF_EVENT_IOC_ENABLE(r57, 0x8912, 0x400200) getsockname$packet(r57, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r59 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r58, 0x1b, r59, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r60 = socket$inet6_tcp(0xa, 0x1, 0x0) r61 = fcntl$dupfd(r60, 0x0, r60) ioctl$PERF_EVENT_IOC_ENABLE(r61, 0x8912, 0x400200) getsockname$packet(r61, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r63 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r62, 0x1b, r63, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r64 = socket$inet6_tcp(0xa, 0x1, 0x0) r65 = fcntl$dupfd(r64, 0x0, r64) ioctl$PERF_EVENT_IOC_ENABLE(r65, 0x8912, 0x400200) getsockname$packet(r65, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(r65, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000019c0)=0xe8) r67 = socket$inet6_tcp(0xa, 0x1, 0x0) r68 = fcntl$dupfd(r67, 0x0, r67) ioctl$PERF_EVENT_IOC_ENABLE(r68, 0x8912, 0x400200) getsockname$packet(r68, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r70 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r69, 0x1b, r70, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r71 = socket$inet6_tcp(0xa, 0x1, 0x0) r72 = fcntl$dupfd(r71, 0x0, r71) ioctl$PERF_EVENT_IOC_ENABLE(r72, 0x8912, 0x400200) getsockname$packet(r72, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r74 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r73, 0x1b, r74, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000002480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x41080000}, 0xc, &(0x7f0000002440)={&(0x7f0000001a00)={0xa24, r7, 0x120, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r43}, {0x84, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r46}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7, 0x0, 0x4, 0xc9}, {0xfe00, 0x5, 0x20, 0x800}]}}}]}}, {{0x8, 0x1, r49}, {0x268, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r53}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8}}}]}}, {{0x8, 0x1, r55}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffff7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r5}, {0x1a0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xe0}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8, 0x1, r58}, {0x80, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r62}, {0xb8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r5}, {0x194, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x0, 0x0, 0x0, 0x8000}, {0x4, 0x1, 0x5, 0x9}, {0x2, 0x4, 0x81, 0x27d7}, {0x7f, 0x8, 0x0, 0xdc}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9ac, 0x8, 0x2, 0x6}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r66}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x134, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r69}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r73}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x84, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0xa24}, 0x1, 0x0, 0x0, 0x800}, 0x1) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:33 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599", 0x66}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:33 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod(&(0x7f0000000000)='./file0\x00', 0x10, 0x2d05) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0xfffffffc, 0x8000, 0x3, 0x20000000, 0x40000}, 0x1c) 06:44:33 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000001000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000100)=""/232) ioperm(0x2, 0x76d, 0x77e3) 06:44:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r3, 0x1b, r4, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0xfffffffffffffe17) r5 = dup3(r0, r4, 0x80000) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r6, &(0x7f0000000000)={0x40000011}) r7 = socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x6, 0x6) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r9) connect$inet6(r9, &(0x7f0000000040)={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x14}, 0x9}, 0x1c) r10 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x4) setsockopt$packet_int(r7, 0x107, 0x9, &(0x7f0000000080)=0x20000, 0x4) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a92388", 0x4c}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:34 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0xdf, 0x5, 0x80, 0x1f, 0x0, 0x7fff, 0x20000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x400, 0x1, 0x8001, 0x16, 0x9, 0x9, 0x8000}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r6, 0x1b, r7, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r7, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) setsockopt$packet_buf(r7, 0x107, 0xd, &(0x7f0000000180)="6c44674889c3997f29b07da47d88d20e215eda56b5d49ec971a9af1fd110295f416e73af9150a7eb026ed372ce2cf95a205bb380c706ae735e8296517d5d99d3a689f7b8cb90e8ef45b0ba733b2bdb61055306572876b10e2793c3c20f44c793dd0fef9ef96fddc85594f67a4b13b01f40bc96a469eb0a3446cacfd637bdb16785ed3bdee25ce8bec1b3365d44b273a2e2ec2f342f9c338631e8824a6555c9896e92f59d9fb61f2c068e8027049471d36e74113f21a1aebb581e2154212210d395f1c53d5354e0fdb885fb", 0xcb) r8 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:34 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3", 0x6d}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:34 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = dup2(r4, 0xffffffffffffffff) ioctl$RTC_WIE_ON(r5, 0x700f) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r6 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:34 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a92388", 0x4c}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0x1) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r6 = socket$unix(0x1, 0x400040000000001, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x0) ioctl$KDDELIO(r7, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r7, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r8 = accept4$inet(r7, &(0x7f0000000100)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10, 0x40800) sendto(r8, &(0x7f0000000300)="5ad44b045ebfc423fc86de2763a2552eb18d312294ea9be9206389a796abb5fee64eeaf3dffc23a385f6a7ee591590f4088f9b10c187d7c22de36f14f9af8bb79c6d4d3c1bfb7eaa7e89c9802b406757449302766a7b2f86908b6c81eb7fbc30944bda75cdeaa5500700b8b64fa7e52382bf15315f42ece6ff7494d2a29af33b0b5a1fd6eda8784dca4d74f44e3b31af15c2d56a2585871dcb4d1bd1d5d291ccc2f7a325d5366b3d708cc12d1e765d046b80451780ab49602a391614e92fadcb3974e0339ed89b74b6527b0790402e094fa00243725d0c95d02ab4c87af63497b894dc71f06fb255d787c5a4e8", 0xed, 0x1001, &(0x7f0000000600)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0xc066, @mcast2, 0x8}}, 0x80) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r5, 0x1b, r9, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r9, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_int(r4, 0x107, 0x3, &(0x7f0000000000)=0x5, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:35 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB=',\x00\x00\x00\n\x00'/20, @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:35 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:35 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/158}) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:35 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3", 0x6d}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0xfffffffffffffdf2) 06:44:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req={0x2, 0x3, 0x1, 0x73f50709}, 0x10) 06:44:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b", 0x4d}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x180, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000100)="c217ccbcc34f974c263c241304b6116ea6e971c0f6ecfa75") socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x12b) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r5, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r6 = fcntl$dupfd(r2, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x5, 0x3, 0x5d, 0x6}, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r6, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYRES16], 0x3}, 0x1, 0x0, 0x0, 0x48005}, 0x29f48956c4c95f68) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000280)=""/207) 06:44:36 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:36 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:36 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="140001002181000000000000005a22446d40af76db064f8cd202d7eb9968250972138072a731bc1886622c31887a3f43fc16c9f7a866e9c9e8440d99079195e03c9f255dec9bf07e4f50bad905450f7b4351f3bc010a5ed569807e21830fefc046545e0d35c7752ff4f1f3053301189f4ac592d4b442faabd53d2ccdb5"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000040)=0x7, 0x4) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000000)) r3 = fcntl$dupfd(r1, 0x0, r1) getsockopt$packet_int(r3, 0x107, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$unix(0x1, 0x1, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) close(0xffffffffffffffff) 06:44:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3", 0x6d}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b", 0x4d}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:36 executing program 5: r0 = socket$unix(0x1, 0x400040000000001, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=@newtaction={0x67ec, 0x30, 0x20, 0x70bd29, 0x25dfdbff, {}, [{0x67d8, 0x1, @m_pedit={0x67d4, 0x15, {{0xc, 0x1, 'pedit\x00'}, {0x670c, 0x2, [@TCA_PEDIT_PARMS={0xe80, 0x2, {{{0x100, 0xb35, 0x1, 0x38, 0x3}, 0x4, 0x5, [{0x80000000, 0x3, 0x8000, 0x7f, 0x7ff, 0x5fb}, {0x0, 0xc0, 0x9, 0x1000, 0x80000001, 0x7}, {0x2, 0x2, 0xd97, 0x0, 0x9}, {0x80000000, 0x1, 0xffffffff, 0x5, 0x9, 0x8}]}, [{0x401, 0xd36, 0x1, 0xa3, 0x1000, 0x80}, {0x9, 0x4, 0xff, 0x6, 0xffffffa9, 0x40}, {0x7, 0x7fffffff, 0x1f, 0x4, 0x7, 0x2}, {0x200, 0x3, 0x5, 0x1ff, 0x8, 0x8}, {0x0, 0x3, 0x7, 0x9, 0x3c39, 0x1}, {0x7, 0x0, 0x7f, 0xd469, 0x1, 0xfff}, {0x984e, 0x8, 0x9, 0x8, 0x0, 0x1}, {0x9, 0xa0000000, 0x100, 0xcc3, 0x6, 0x6}, {0x6, 0x3, 0x1000, 0x0, 0x19a, 0x8}, {0x8, 0x1, 0x6, 0x441bb1c9, 0x8001, 0x8}, {0x4, 0x7dd, 0xfffffffa, 0x0, 0x5, 0x8}, {0x401, 0x3, 0xffff, 0xa8d5, 0xffffffff, 0xb0b9}, {0x5, 0x20, 0x0, 0x4, 0x4, 0x9}, {0x2, 0x0, 0x401, 0xfff, 0x6, 0x2}, {0x6, 0x6, 0x2, 0x0, 0xfff}, {0x3, 0x4, 0x1, 0x1f, 0x6, 0x7fffffff}, {0x5, 0x0, 0x0, 0x70, 0x20, 0x1c0}, {0x0, 0x6, 0x6, 0x0, 0x6, 0xf217}, {0x2, 0x43dc, 0x1, 0x401, 0x1, 0x8ce8}, {0xff, 0x80, 0x3, 0x6, 0x1, 0x80000000}, {0x10001, 0xff, 0xffff7113, 0x5, 0x3, 0x5291}, {0x8001, 0x1000, 0x2, 0x80, 0xffff, 0x9}, {0x1, 0x6, 0x7, 0x7, 0xf46, 0xc846}, {0x8, 0x7, 0x3, 0xb, 0x4, 0x1}, {0x1, 0x3, 0x10000, 0x401, 0x3f, 0x8}, {0x6, 0x0, 0x10001, 0x1f, 0x402, 0x400}, {0x4, 0x80000000, 0x6, 0x790, 0x9, 0x9}, {0x360, 0xb00, 0x3, 0x400, 0x9a9, 0xffffff01}, {0x6, 0x8, 0x7fffffff, 0x5, 0x4, 0x7ff}, {0x40, 0x7, 0x200, 0x2, 0x5, 0x1}, {0x7, 0x9, 0x6515, 0x80000001, 0x3, 0x9}, {0x6, 0x8, 0x2, 0x4, 0x4, 0x80000001}, {0x81, 0x8, 0x7, 0x8, 0x2, 0x8001}, {0x1, 0x9f1, 0x8000, 0x7ff, 0x0, 0x80}, {0x3, 0x1, 0x80000001, 0x7fff, 0x80000, 0x112}, {0xffff, 0x401, 0x7fffffff, 0x5, 0x8, 0x2}, {0x0, 0x7fffffff, 0x6, 0x1, 0x7, 0x2}, {0x3, 0x1, 0x2, 0x4, 0x7, 0x80000000}, {0x10001, 0x3bdc, 0x3ff, 0x3, 0xfffffffe, 0x2}, {0x10001, 0x0, 0x7f, 0x8001, 0x4, 0x8}, {0x5, 0x1, 0x101, 0x7f, 0x17ac, 0x7}, {0x6, 0xf3f, 0x7, 0x7, 0x2, 0x5}, {0x5, 0x8000, 0x4, 0x5065, 0xfff, 0x4}, {0x7, 0xb2, 0x8001, 0x5, 0x5, 0x7f}, {0x3, 0x5, 0x1, 0x0, 0x0, 0x10001}, {0x7, 0x27467af5, 0x6, 0x4, 0x9, 0xa7}, {0x5, 0x9, 0x7, 0x4, 0x3, 0x6}, {0x8, 0x0, 0x3, 0xfffffff9, 0x5, 0x7c}, {0x3, 0xd741, 0xffff8000, 0x6, 0x401, 0x401}, {0x7, 0x7, 0x5, 0x3, 0xf6, 0x1}, {0x9, 0x8, 0x3, 0x2, 0xcb, 0x7}, {0xee5b, 0x3, 0x8000, 0xc1, 0x6, 0x3f}, {0x9, 0x5, 0xf6da, 0x2, 0x6, 0x9}, {0x4, 0xfffffc01, 0x7, 0x4, 0x1, 0x400}, {0xffff, 0x7, 0x100, 0x985, 0x5120, 0x2}, {0x2, 0x10000, 0x2, 0x2e34, 0x80000000, 0x80800000}, {0x3ff, 0x3, 0x0, 0x7, 0x4, 0x7fffffff}, {0x100, 0x2f07, 0xffff, 0x7, 0x5, 0x17}, {0xffff, 0x45, 0x4, 0x43, 0x0, 0x34}, {0x1, 0x80000000, 0x7ff, 0x3, 0x9, 0x8001}, {0x6, 0x6, 0x5, 0x101, 0x8, 0x1}, {0x100, 0x33, 0x1, 0x1000, 0x7, 0x1}, {0x2, 0x10001, 0x6, 0x1ff, 0x10000, 0xffffffc0}, {0x6, 0x200, 0x1, 0x80, 0x5, 0x4}, {0x20, 0x0, 0x401, 0x5, 0x10}, {0x9cc2, 0x6, 0x3ff, 0x0, 0x7f, 0x2}, {0x1, 0x3, 0x1, 0x5, 0x0, 0x10000}, {0xb5b6, 0x5, 0x8000, 0x9, 0x5}, {0x6, 0xc00, 0x0, 0x1, 0x5615, 0x3}, {0x401, 0x9, 0xe9b0, 0x6, 0x390, 0x4}, {0x1, 0x6, 0x7f, 0x2, 0x7}, {0x7, 0x5, 0x6, 0x800, 0x5, 0x2}, {0xfffffffd, 0x3, 0xffffffff, 0x40, 0x80000000, 0x8}, {0x0, 0x8, 0x8001, 0x1, 0x100, 0x2}, {0x9, 0x4, 0xffffffe1, 0x7fff, 0x0, 0x6}, {0x1000, 0x4, 0x81, 0x3, 0x5, 0x6d}, {0x800, 0x1, 0x81, 0x1, 0x3, 0x9}, {0x3, 0x8, 0x0, 0x4, 0x4, 0x1f153eb1}, {0x1, 0x9, 0xcf11, 0x4, 0x1, 0x400}, {0x1, 0x1f, 0x9891, 0x91, 0xfffffffc, 0x20}, {0x70c2fb32, 0x2, 0x2784, 0x9, 0x4, 0x6}, {0x10000, 0x9, 0x3ff, 0x8, 0x6, 0x4}, {0xb3ca, 0x7, 0x10000, 0x3, 0x1, 0x465e}, {0x3, 0x3, 0xff, 0x80000000, 0x0, 0x20}, {0xff, 0x1466, 0x401, 0x7, 0x40, 0xffff0001}, {0x7ff, 0x3, 0x100, 0x1, 0x100, 0x4}, {0x0, 0x6, 0x2, 0x891f, 0xffffffff}, {0x5, 0x791, 0x7, 0x7ff, 0x1, 0x5}, {0xd0, 0x400, 0x3, 0x6, 0x8c, 0x600000}, {0x3aa, 0x0, 0x10001, 0x8, 0xfffffffc, 0xbe}, {0x4f, 0x7ff, 0x43, 0x3, 0xd81, 0x1}, {0x622c7e7a, 0x7, 0x20, 0x1f, 0x3, 0x4}, {0x4, 0x0, 0x200, 0x10000, 0x20, 0x4}, {0x33e59bd2, 0x8, 0x3, 0x7, 0x1, 0xfffffffe}, {0x1, 0x2, 0x8, 0x1ff, 0xfffffffa, 0x7c}, {0x760, 0x7, 0x4, 0x3ff, 0xffffffff, 0x5}, {0xfc, 0x3, 0x1, 0x5, 0x55b2d36, 0x2}, {0x7, 0x3ff, 0x20, 0x1ff, 0x2, 0x70f390ee}, {0x4, 0x4, 0x1, 0x5124, 0x3ff, 0x8}, {0x3, 0xdd, 0xfffffff9, 0x9, 0x3, 0x7}, {0x3f, 0x1ff, 0x10001, 0x1d, 0xec9, 0x81}, {0x42, 0xfffff000, 0x3, 0x3, 0xfffffffb, 0x8}, {0xb9, 0x3, 0x5, 0x2, 0x9, 0x2}, {0x6, 0x2, 0x7, 0xffffffff, 0x7, 0x6}, {0x401, 0x3, 0x5, 0x1, 0x80000000}, {0x6, 0x4, 0x560, 0x8, 0x0, 0x574}, {0x1, 0x2, 0x2, 0x0, 0x100, 0x5}, {0x0, 0x8e717c9, 0x81, 0x3ff, 0x3f, 0x1}, {0x4, 0xe0, 0xedb3, 0x3ff, 0xffff}, {0x0, 0x3, 0x20, 0x5, 0xfffffff9, 0x7d5f}, {0xffffffff, 0x9, 0x5, 0x17e, 0x3ff, 0x7}, {0x0, 0x2, 0x2, 0x7ff, 0xf5, 0x200}, {0x0, 0x1ff, 0x1, 0xda32, 0x2, 0x1}, {0x80, 0x2bff, 0x6, 0x7, 0xfff, 0x10000}, {0x5, 0x5, 0xffff5406, 0x2, 0x7, 0xe5d6}, {0x800, 0x8, 0x100, 0x52, 0x3, 0x3}, {0x3ff, 0x40000000, 0x6, 0x0, 0x33d, 0xffff0001}, {0x2, 0xfffffeff, 0xe0, 0xff, 0x1, 0x80000001}, {0xa000, 0x8, 0x4, 0x0, 0xaa, 0x7}, {0xff, 0xfffff800, 0xfffffaaa, 0x1800, 0x8, 0x77}, {0x3d, 0x9, 0x1227, 0x200, 0x800, 0x2}, {0x9, 0x6, 0x2, 0xff, 0x3, 0x8000}, {0x7, 0x3, 0x9, 0x7f, 0x8001, 0xfff}, {0x6, 0x100, 0x5ac, 0x2, 0x6, 0xed3f}, {0xfff, 0x1, 0x80000001, 0xb69, 0x4, 0x7}, {0x200, 0xffff, 0xffff8000, 0x3, 0x7fffffff, 0x101}, {0x9, 0x7, 0x1000, 0x4, 0x0, 0x9}, {0x1000, 0x3e2, 0x81, 0x80000000, 0x4, 0x1}], [{0x2, 0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x5, 0x3}, {0x4}, {0x0, 0x1}, {0x7}, {0x1, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {}, {0x3}, {}, {0x5, 0x138986bdf8997a03}, {0x2, 0x1}, {0x4, 0x2}, {0x5}, {0xf, 0x1}, {0x3}, {0x3}, {0x5}, {0x0, 0x1}, {0x1}, {0x3, 0x1}, {0x4, 0x3}, {0x2, 0x1}, {0x5}, {0x3}, {0x5}, {0x0, 0x1}, {}, {0x5, 0x66ff6cfbd9afb9b8}, {0x5, 0x1}, {}, {0x1, 0xb6f3fcb24f3211af}, {0xa1a1b1262f0c450a, 0x1}, {0x4}, {}, {0x2, 0x1}, {0xa, 0x1}, {0x5}, {0x2}, {}, {0x2, 0x1}, {0x4}, {0x9e668cb4bb7717f8}, {0x7}, {0x0, 0x1}, {0x5, 0xf0f230f4aaa42e84}, {0x4, 0x3}, {}, {0x4, 0x3}, {0x4}, {0x5}, {}, {0x1, 0x1}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x3}, {0x1, 0x1}, {0x1}, {0x4}, {0x3}, {0x4, 0x1}, {0x1, 0x1}, {}, {0x3}, {}, {0x5}, {0x3}, {0x6}, {0x9920ec7cd70cb236, 0x9c2da3837b36883e}, {0x4, 0x1}, {0x4}, {0x4}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x1, 0x1}, {0x2}, {0x2, 0x1}, {0x5, 0x1}, {0x3}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x4, 0x6c245b535bbfd2fa}, {0x2, 0x2}, {0x3}, {0x5}, {0x0, 0x1}, {0x5}, {0x1, 0x1}, {0x2, 0x3}, {0x1}, {0x1}, {0x5, 0x1}, {0x2}, {0x2}, {0x1}, {0x1, 0x2}, {0x5, 0x1}, {0x2, 0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x7d3b063d79d6f681, 0x2}, {0x2, 0x3}, {}, {}, {0x8, 0x1}, {0x5, 0x889159db53ad5d4}, {0x3}, {0x0, 0x1}, {0x4}]}}, @TCA_PEDIT_PARMS_EX={0xef8, 0x4, {{{0x8, 0x8, 0x2, 0x0, 0x7f}, 0xff, 0x6, [{0x1, 0x1f8000, 0x7, 0x34e, 0xe8000, 0x7f}, {0x8, 0xff, 0x80000001, 0x1, 0x80, 0x9}, {0x85, 0x0, 0x7f, 0xc6b4, 0x5, 0x2}, {0x81, 0x400, 0x5, 0x5, 0xffffff00, 0x52a5}, {0x8001, 0x0, 0x10000, 0x2, 0x6, 0x11e}, {0x7, 0x1, 0xd134, 0x20400, 0x1000, 0x2}, {0x4, 0xee, 0xd88, 0x6, 0x101, 0x5}, {0x1, 0xaf1153cb, 0x1, 0x7fff, 0xeb7, 0x1}, {0x8, 0x3ff, 0x9, 0x5, 0x5, 0xab}]}, [{0x9fbd, 0xf6, 0x0, 0x82, 0x0, 0x9}, {0x7, 0x4, 0x0, 0x6, 0x4, 0x1000}, {0x5, 0x8, 0x6, 0x3, 0x8, 0x9}, {0xfffff6e3, 0x8, 0x2, 0x9542, 0x4, 0x4}, {0x0, 0x80000001, 0x100, 0x4, 0x0, 0x3}, {0x7e6b, 0x33e2a42d, 0x5, 0x2a10ff94, 0x2, 0x66}, {0x2, 0x8, 0xfffffffd, 0x7fff, 0x1, 0x1}, {0x6, 0x5, 0x7, 0xfff, 0x5, 0x317b9c44}, {0x8, 0x401, 0x3, 0x4e, 0x4, 0x47}, {0x9, 0xc007, 0xfffffffb, 0xbabd, 0x9, 0x4}, {0x1000, 0x20, 0x7ff, 0x7, 0xb4e, 0x8001}, {0x3, 0x8f89, 0x7, 0x10000, 0x2, 0x7ff}, {0x5, 0x200000, 0xffffffff, 0x2, 0x3, 0x7f}, {0x3, 0x3, 0x100, 0x0, 0x87000000, 0x6}, {0x4, 0x1, 0x9, 0xffffff28, 0x0, 0x4}, {0x1bac, 0x7, 0xfffffff8, 0x3, 0xffff, 0x8}, {0x5, 0x7c3d, 0x10001, 0x8001, 0x5c, 0x7c}, {0x4, 0x200, 0x2, 0x401, 0x9, 0x10000}, {0x0, 0x7, 0xff, 0x1, 0x41, 0x5}, {0x2, 0x100, 0x5, 0x2, 0x7, 0x3}, {0x9, 0x9, 0x0, 0xffff, 0x9, 0xdc}, {0x7, 0x10001, 0x7ff, 0x0, 0x800, 0x9}, {0x8, 0xeeb, 0x3, 0x0, 0x9, 0x3}, {0xce5, 0x3, 0x3f, 0x3ff, 0x8001, 0x3}, {0x7636, 0x1f, 0x81, 0x9, 0x7, 0x1}, {0x424, 0x5a8, 0x6, 0x80000001, 0x7, 0x7fffffff}, {0x80000001, 0x81, 0x3, 0x49, 0x1, 0x9}, {0x1, 0x2, 0x7, 0x0, 0x1, 0x1c6}, {0x1000, 0x7, 0xff, 0x1, 0x8, 0x400}, {0x26675c31, 0x4, 0x8, 0x0, 0x1, 0x1}, {0xfff, 0x400, 0x20, 0x3, 0x5, 0x20}, {0x0, 0x3, 0x9, 0x401, 0x1, 0xfffffff7}, {0x2, 0x1, 0x101, 0x80000000, 0x9f, 0x7}, {0x101, 0x6, 0x200, 0x80000001, 0xb0, 0x6}, {0x4, 0x80, 0x0, 0x794b066d, 0x10000, 0x9}, {0x2, 0x1, 0xea5, 0xcad, 0x1, 0x2}, {0x1b, 0xab2, 0x5, 0x2, 0x3, 0xfffff001}, {0xff, 0xfff, 0x0, 0x7fffffff, 0x6, 0x5}, {0x0, 0x20, 0x0, 0x8, 0x0, 0x7}, {0xbcf768cf, 0x4, 0x0, 0x13, 0x7, 0x7}, {0x8, 0x2, 0x200, 0xfffffffc, 0x20, 0x1}, {0x3, 0x0, 0x80d, 0x9, 0x1, 0x6}, {0x7, 0x20, 0x6, 0xfffffffb, 0x2, 0x1}, {0x3, 0x10001, 0x1f, 0x2, 0x9c182244, 0x5}, {0x7fff, 0x90b, 0xfff, 0xa182, 0x9, 0xa70c}, {0x2, 0xc4, 0x9, 0x1de, 0xffffff72, 0x7fff0000}, {0x800000, 0x10001, 0x4b9, 0x7, 0x0, 0xffffffff}, {0x4, 0x7, 0x6, 0x3, 0x1f, 0x7}, {0x8, 0x3, 0x4, 0x0, 0x9, 0x81}, {0xffff, 0x3, 0x1ff, 0x5, 0x5, 0x7}, {0x1, 0x6, 0xffffffff, 0x96a, 0x6e99, 0x6}, {0x94, 0x4, 0x1, 0x10000, 0x0, 0x33b38f48}, {0x0, 0x3da, 0x9, 0x20, 0x7}, {0x98, 0xa000000, 0xfffffe65, 0x5892, 0xc1, 0xfff}, {0x1, 0x7, 0x9, 0x7fff, 0x2}, {0x4, 0x5, 0x2, 0x20, 0x9, 0x2}, {0x0, 0x2, 0xf7bc, 0x400, 0x400, 0x5}, {0xff, 0x6, 0x7fffffff, 0x67d4, 0x2}, {0x7, 0x2, 0x800, 0x9, 0x2665, 0x3a0}, {0x2, 0x6, 0xd0000000, 0x5, 0xc5bd, 0x7}, {0x800, 0x10001, 0xfffffffb, 0x8, 0x5, 0x800}, {0x9, 0xff, 0x1000, 0xffffffff, 0x9, 0x6}, {0x6, 0x80000000, 0x8, 0x8, 0x87, 0x5}, {0x800, 0x2, 0xfffffff7, 0x6, 0x5}, {0x80, 0x2, 0x3, 0xff, 0x6c, 0xb1e}, {0x1, 0x4d6817d7, 0x4, 0x1f, 0x1, 0x6}, {0x2, 0x2, 0xd3b, 0x401, 0x5, 0xbdac}, {0x2, 0x0, 0xe0a, 0x8000, 0x0, 0x5}, {0x2, 0x5bec, 0x200, 0x3f, 0x7fff, 0x2}, {0xffff, 0x80, 0x7, 0x6b34, 0xffff, 0x8}, {0x6000000, 0x0, 0x0, 0xd6, 0xffffffff, 0x1b}, {0x80, 0x800, 0x3f, 0x1, 0x200}, {0x1ff, 0x2, 0x6702, 0x0, 0x10000, 0x1f}, {0x1ff, 0x3, 0x800, 0x8019, 0x80000000, 0x9}, {0x9, 0x9e, 0x1, 0x8001, 0x20416cfb, 0x4}, {0x5, 0xe35, 0x3, 0x8, 0x0, 0x3}, {0x1ff, 0xff, 0xffffff6f, 0x7f, 0x1ff, 0x6}, {0x0, 0x3, 0x9, 0x4, 0x2, 0x8}, {0x4, 0x9, 0x2, 0x9, 0x6, 0x9}, {0x80, 0x20, 0x7, 0x1, 0x1ff, 0x8}, {0x40, 0x3e8b45a4, 0x1, 0x8, 0xc79c, 0x400}, {0x1000, 0x8, 0x6a4c, 0xc17, 0xb3, 0x9}, {0x2, 0xfffff8bd, 0x81, 0x6, 0x1, 0xfffffff8}, {0x4, 0x20, 0x0, 0x69, 0x3, 0x1}, {0x722d, 0x1, 0x3, 0x0, 0x10000, 0x80000001}, {0x8000, 0x9, 0x1, 0x1, 0x1000, 0xa959}, {0x16e7, 0x1, 0x1ff, 0x8, 0x7fffffff, 0xfffffffc}, {0x3ff, 0x5f, 0x8, 0xd65, 0x8, 0x1}, {0x80000001, 0x3, 0x76a9, 0x3ff, 0x3, 0xb17}, {0xffffff80, 0x8, 0x7, 0x3, 0x8, 0xb1}, {0x3, 0xfd, 0x7f, 0x6, 0xa3, 0x5}, {0x8, 0x48, 0x1000, 0x1d2, 0x3f, 0x20002}, {0x4, 0x9, 0xfff, 0x800, 0x3f, 0x9030}, {0x0, 0x7, 0x1ff, 0x0, 0x3ff, 0xfffffffb}, {0x7f, 0x3, 0xb6b4, 0x200, 0x5231, 0x3}, {0x3, 0x2, 0x100, 0xc8, 0x5, 0x800}, {0x6, 0x7fffffff, 0x3ff, 0xd74, 0xffffffff, 0x6}, {0xffff34c6, 0x9, 0x1, 0x200, 0xeaf}, {0x7, 0x0, 0x4, 0x6, 0x4, 0x80000000}, {0x2d, 0x8001, 0xfffffffb, 0x9, 0x5a64, 0x3}, {0x9, 0xaf, 0xff, 0x7, 0x656, 0x10}, {0x1f, 0x4, 0x1f, 0x5, 0x8000, 0x400}, {0xfffffc00, 0x9, 0x6, 0x9, 0xffffffff, 0x7fff}, {0x80, 0x3, 0x8000, 0x0, 0x0, 0x4}, {0x1, 0x7, 0x0, 0x3, 0x9, 0x5df}, {0x7, 0x81, 0xfffffff8, 0x4, 0x1, 0xb4c}, {0x0, 0x4, 0x4, 0x8001, 0x9, 0x7}, {0x6, 0x8, 0x1f, 0x5, 0x80000001, 0xfffffffd}, {0x8, 0x8, 0x10001, 0x0, 0xffffffff, 0x1}, {0x2, 0x400, 0xff, 0x6, 0x10001, 0x7b24}, {0x7, 0x1, 0xb65d, 0x3, 0x9, 0x2}, {0xffffffff, 0x0, 0x8, 0x2, 0x81, 0x1000}, {0x7, 0x0, 0xbe, 0x5, 0xa99, 0x7f}, {0x6, 0x80000000, 0x3ff, 0x100, 0x9e, 0x9}, {0x9, 0x1, 0xebcc, 0xffffffff, 0x6, 0x6}, {0xb48, 0x7ff, 0x27, 0x1000, 0x1, 0x6}, {0x8d, 0x3ff, 0x0, 0x0, 0x2, 0x9}, {0x20, 0x0, 0x9, 0xffffffff, 0x3, 0x20323cc3}, {0xc9c8, 0x800, 0xfffffbff, 0x4, 0x2, 0x7}, {0x7, 0x1f, 0xffffff81, 0x7ff, 0x10000, 0x200}, {0x2d0d, 0xfff, 0x62, 0x21c0000, 0x2, 0xb1}, {0x8001, 0x800, 0xe4de8cde, 0x4, 0x101, 0xfffff800}, {0x4, 0xfffff001, 0x0, 0x7ff, 0x10001, 0xffffd483}, {0x6, 0x1000, 0xa994, 0xffffffff, 0xe8, 0x4}, {0x6, 0xff, 0x461c, 0x6, 0x3ff, 0x4}, {0x2, 0x100, 0x9, 0x0, 0x3ff, 0x1}, {0xec8, 0x10001, 0x3, 0x1, 0x80000001, 0x8}, {0x7, 0x7, 0xff, 0x80000000, 0x7, 0xffff9167}], [{0x0, 0x1}, {0x0, 0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x2}, {}, {0x4, 0x174969d4c9bdbc9d}, {0x3}, {0x4}, {0x2}, {0x4, 0x1}, {0x5}, {0x45c86181f8453796}, {0x2}, {0x1}, {}, {0x1}, {0x0, 0x1}, {0x4}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x3}, {}, {0x1}, {0x50fb934409d578bf}, {0x2fb8bbd0ab95c5da}, {}, {0x5, 0x1}, {}, {0x1}, {0x2, 0x1}, {0x2}, {0x5, 0x1}, {0x5}, {0x2}, {0x3, 0x3}, {0xdf22df8503185253, 0x1}, {0x5, 0x1}, {0x7d8f41e3a5ac7047, 0x1}, {0x0, 0x2}, {0x1}, {0x5}, {0x2}, {0x1, 0x1}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0x3, 0x1}, {0x1}, {0x3, 0x2}, {0x9, 0x1}, {0x3}, {}, {0x0, 0x2}, {0x537dd00b930c008b, 0x1}, {0x8b3f7dcf07f819bf}, {0xb898dd6e188b9586}, {0x4}, {0xd}, {0x2, 0x1}, {0x2}, {0x0, 0x1}, {0xf}, {0x1}, {0x0, 0x1}, {0x2}, {0x5}, {0x4, 0x1}, {0x4, 0x1}, {}, {0x5, 0x3}, {0x1}, {0x5, 0x1}, {}, {}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x4}, {0x1, 0x1}, {0x7, 0x26e0754cbf3c4396}, {0x6fa3d03adda354b6}, {0x3, 0x3}, {0x5}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x0, 0x3}, {0x1}, {0x0, 0x1}, {}, {0x2, 0x1}, {0x4}, {0x3, 0x1}, {0x3, 0x1}, {0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {0x5, 0x3}, {}, {0x3, 0x3}, {0x5, 0x2}, {0x2}, {0xcbaa36b9b586ddb8, 0x1}, {0x5}, {0x5}, {0x4}, {0x2, 0x2}, {0x5}, {0x2, 0x1}, {}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x6}, {0x5}, {0x2, 0x1}, {0x3}, {0x16cba498d8c493e5}, {0x1}, {0x7}]}}, @TCA_PEDIT_PARMS_EX={0xe80, 0x4, {{{0x3f, 0xad, 0x0, 0xffff, 0x5}, 0x65, 0x2, [{0x80000001, 0xff, 0x8, 0x9, 0x9, 0x9}, {0x1f, 0x8, 0x80000000, 0x800, 0x8, 0x9}, {0x1, 0x10001, 0x9, 0x48000, 0x1, 0x2}, {0x8, 0xff, 0x1ff, 0x1, 0x6, 0xfffff42d}]}, [{0xff, 0xbe, 0x1, 0x8, 0xfffffff9, 0x4}, {0x1, 0x9, 0x2, 0x10001, 0x6}, {0xbdc6, 0x8, 0xffffffc0, 0x7, 0x4, 0xfffeffff}, {0x10001, 0x2, 0x20, 0x1f, 0x40, 0x20}, {0x7, 0x9, 0xd25, 0xa15e, 0x0, 0x7}, {0x200, 0x800, 0x1, 0x9, 0x0, 0xff}, {0xffffffff, 0x1, 0x7, 0x7, 0x765e, 0x8}, {0x800, 0x1, 0x5, 0x5, 0x572, 0x8}, {0xfffffffc, 0x4, 0x5, 0xffffffe1, 0x1, 0x1}, {0x1ff, 0x5, 0x76b, 0x9ad, 0x4a, 0x7fffffff}, {0x1, 0x7f, 0x9, 0x81, 0xca6}, {0x3f, 0x8001, 0x4, 0x50, 0x8001, 0x9}, {0x7, 0x7f, 0x6, 0x9f1, 0x3, 0x3}, {0x108000, 0x100, 0x9, 0x7ff8, 0x5630, 0xab}, {0x80000001, 0x7fff, 0x8b, 0x1e9f, 0xa3e, 0x7fffffff}, {0x1a9, 0x4, 0x2, 0x9, 0x6, 0x46d}, {0x8, 0x401, 0x3ff, 0x7fff, 0x80000000, 0x3}, {0x9, 0x800, 0xffffffff, 0xffff, 0x4, 0x9}, {0x0, 0xffff, 0x6, 0x8, 0x3, 0x5}, {0x7, 0x4, 0x3ff, 0x5, 0x269, 0x5}, {0x80000001, 0x7, 0xffffffe0, 0x200, 0x2, 0x5}, {0x1000, 0x80000000, 0x0, 0xfffff24a, 0x1, 0x10000}, {0x0, 0xfffffff8, 0x2, 0x6, 0x1800, 0x4}, {0x2, 0x7d, 0x9, 0x4, 0x401, 0x9}, {0xf2b, 0xffffffff, 0x7, 0x3, 0x2, 0x8}, {0x1ee20c87, 0xfffffffc, 0x0, 0x6, 0x4, 0xf3d}, {0x5, 0x5, 0x7ff, 0x9, 0x5, 0x2}, {0x40, 0x6, 0x5, 0x10, 0x7ff, 0x81}, {0x2, 0x8001, 0x401, 0x80000001, 0x1e}, {0x5, 0xffffffff, 0x7f, 0x6, 0x400, 0x8}, {0xe35c, 0x3f, 0x3, 0x4, 0x3, 0x7f}, {0x5, 0xbd36, 0x7, 0x2199, 0xffffffff}, {0x2, 0xda2e, 0xec, 0x6814a3e0, 0x6, 0x2}, {0xffffb3e8, 0xfffffffd, 0xfffff000, 0x0, 0x8, 0xc4}, {0x4, 0xffffff80, 0x40, 0xe0, 0x80000001, 0x7}, {0xbf, 0x71, 0x6, 0xa81d, 0x7, 0x8}, {0x4, 0x2217, 0x5, 0x8, 0x20, 0x4}, {0x0, 0x0, 0xa2, 0x800, 0x40, 0xe0a7}, {0x6, 0x53c, 0x5, 0xfffff0b7, 0x6, 0x7}, {0x9f, 0xfffeffff, 0x80000001, 0x3, 0x9, 0x4}, {0x8, 0xfffffff8, 0x81, 0x58, 0x20}, {0x9, 0x6, 0x800, 0xffffff81, 0x0, 0x71000000}, {0x2, 0x3587, 0x9993, 0x2, 0x200, 0x9}, {0x800, 0x895, 0x2, 0xe7, 0xc8, 0xff}, {0x5, 0x0, 0x7, 0x8, 0x6, 0x4db}, {0x3f, 0x6, 0x7b, 0xfe1a, 0xffff, 0x5}, {0x2, 0x0, 0x4, 0x6, 0x3, 0x800}, {0x7, 0x2, 0x5, 0x4, 0x100, 0x5}, {0x81, 0x3ff, 0x2, 0x2, 0x7, 0x3}, {0xfffffffc, 0x78, 0x5fe, 0x1, 0x6, 0x1}, {0x2e33, 0x8, 0x10001, 0x1940, 0xfffc0000, 0x81}, {0x81, 0x56550, 0x3, 0x3, 0x8b, 0x1}, {0xbd9, 0x40, 0x81, 0x3f, 0x9, 0x4}, {0x6, 0x434a, 0xfffffff9, 0x6, 0x9, 0xff}, {0x2f, 0x1000, 0x7, 0xfffffffd, 0x9, 0x1ff}, {0x6, 0x2000000, 0x8, 0x9, 0x100, 0x9}, {0x5, 0x6, 0x1, 0x40}, {0x7fffffff, 0x20b0, 0x3, 0x401, 0x4, 0x1000}, {0x6, 0x1, 0xfff, 0xfffffff8, 0x3, 0x801a}, {0x9, 0x5, 0x13, 0x4, 0x5, 0x80}, {0x6, 0x99, 0x3f, 0x6, 0xa1, 0x3}, {0x9, 0x4, 0x8, 0x6, 0x2, 0x7f}, {0xfffffffd, 0x3fc0000, 0x5, 0x1, 0x10001, 0xffff0000}, {0x9, 0xff, 0x4, 0x1, 0x3ff, 0x400}, {0xde, 0x8000, 0x1, 0x4, 0x0, 0x4}, {0x3f, 0x2, 0x12, 0x2, 0x7ff, 0x3}, {0x100, 0x5, 0x3, 0x5}, {0x8224, 0x50, 0x5, 0x2, 0xbfb6, 0x6a}, {0xffffffc1, 0x9, 0x1c6f0f44, 0x993, 0x101, 0x2}, {0x4, 0x3ff, 0x5, 0x83, 0x9, 0x1}, {0x0, 0x7, 0xfff, 0x7fff, 0x0, 0x3de43133}, {0x3f, 0x6, 0x3, 0x1, 0x0, 0x200}, {0xfffffa89, 0x6, 0x9, 0x7fffffff, 0x8, 0x20}, {0x23, 0x0, 0x2, 0x2, 0x4, 0x81}, {0x5, 0x8000, 0x101, 0x0, 0x9, 0xc1}, {0x80000001, 0x8, 0xe03, 0x7, 0x101, 0x1f}, {0x8, 0x5, 0x8, 0x8000, 0x0, 0x2}, {0x5, 0x10000, 0x9, 0x5, 0xffff0001}, {0x8001, 0x20, 0x1, 0x40, 0x0, 0x9}, {0x3, 0x8, 0x4, 0x7fff, 0xff, 0x5}, {0x1ff, 0x4, 0x3, 0x401, 0x101, 0xfffffffc}, {0x8, 0x2, 0x8, 0x101, 0x80000001, 0x7}, {0x8000, 0x6, 0x4, 0x2, 0xf57, 0x8}, {0xac7f, 0x6, 0x8, 0x3f, 0x0, 0xff}, {0x5, 0xfff, 0x6, 0x0, 0x401, 0x40}, {0x8, 0x449, 0x18a, 0x6030, 0x1ff, 0x6}, {0x7ff, 0x1cad, 0x2, 0x8, 0x1, 0x8001}, {0x1, 0x3, 0xffffffff, 0x3, 0xffffff87, 0x401}, {0x0, 0x0, 0x8, 0x1, 0x2, 0x2}, {0x80000000, 0x3, 0x7, 0x3, 0x8, 0x2}, {0x627b8e82, 0x9, 0x0, 0x1, 0x2, 0x1ff}, {0x1f, 0xffffffff, 0x78c4, 0x800, 0xff, 0x3f}, {0x6, 0x1000, 0x10000, 0x1, 0x227d196e, 0x6}, {0x1, 0x8000, 0x200, 0x7, 0x0, 0x8}, {0x4, 0x3, 0x4, 0x7, 0x482, 0xc7}, {0xfff, 0xffffffff, 0x8, 0x8, 0x9c03, 0xf2}, {0x736, 0x4, 0x2, 0x7, 0x7fffffff, 0x3}, {0xc19, 0x80, 0x3a8, 0x0, 0x7, 0x5}, {0x3d, 0x20, 0x6, 0xf2a1, 0x7ff, 0x2}, {0x3, 0x7, 0x0, 0xc689, 0x5, 0x2}, {0x5, 0x1, 0x7fffffff, 0x8, 0x7ff, 0x8}, {0x6, 0xcad8, 0x7, 0x2, 0x6, 0x8}, {0xd587, 0x7, 0x9, 0x40, 0x9, 0x9}, {0xe21e, 0x5, 0x40, 0x4ac3, 0x9, 0x8}, {0x3ea7a17c, 0x4b25, 0xde, 0x9, 0x5, 0x1}, {0x1, 0x8, 0x5, 0x6, 0x0, 0x7}, {0x3, 0x80000001, 0x0, 0x9, 0x2, 0x3}, {0x4, 0x9, 0x1, 0x7, 0x3, 0x5}, {0xa8b3, 0x1, 0x4, 0x8001, 0x37e, 0x7}, {0x9, 0xff, 0x7fffffff, 0x1, 0x5, 0x9}, {0xeb, 0x8, 0x8, 0x6, 0x100, 0x7b5}, {0x5, 0x6, 0x3166, 0xff, 0x5, 0x7}, {0x5, 0x5, 0x3, 0x6, 0x100, 0x1}, {0x6, 0x5, 0xf9, 0x7fffffff, 0x7fffffff, 0x7}, {0x46, 0x8, 0x7, 0x8, 0x74b6, 0x1}, {0x1000, 0x5, 0x1, 0x0, 0x4, 0x7fff}, {0xd11, 0x3, 0x5, 0x8000, 0xb7b8, 0x3}, {0xdf2f, 0x5ad5, 0x1, 0x7f, 0x689b, 0x4}, {0x0, 0x7, 0x1, 0x241, 0x5, 0x9}, {0x200, 0x80, 0x0, 0x3, 0x400, 0x90a7}, {0x8000, 0x6, 0xffffffff, 0x3, 0x2, 0x6}, {0x8, 0x0, 0x7905, 0x3, 0x9, 0x7}, {0x400, 0x8000, 0x3, 0x8001, 0x7f, 0x40}, {0x1000, 0xffff, 0x8, 0x10001, 0x2, 0xbcd}, {0x1, 0x44, 0x4, 0x1, 0x80000001, 0x1}, {0x0, 0x3, 0x7, 0x8, 0x3341, 0x7fff}, {0x9, 0x2, 0xfffffffc, 0x1b9, 0x20, 0x80}, {0x7fffffff, 0x4, 0x7ff, 0x2, 0x7, 0x8000}], [{0x3}, {0x2}, {0x4, 0x1}, {0x5}, {0x4, 0x2}, {}, {0x3}, {0x5}, {0x2, 0x3}, {0x3, 0x1}, {0x4}, {}, {0x5, 0x1}, {0x3, 0x1}, {0x5}, {0x7, 0x1}, {0x2}, {0xe4a3c3ef9fa11195}, {}, {0x69dc729e0a32071e}, {0x0, 0x1}, {0x485bbc97b4fe9737, 0x1}, {0x4}, {0x4, 0x1}, {0x1}, {0xa, 0x1}, {0x1}, {0x2}, {0x3}, {0x2}, {0x2, 0x2e8ccb6e8ce027eb}, {0x0, 0x2}, {0xe, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x3828de8fdfbed902}, {0x4, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x2}, {0x1, 0x2}, {0x3}, {0x5, 0x1}, {0x5, 0xf7dbf22446bce433}, {0x5}, {}, {0x1, 0x1}, {0x1, 0x1}, {0x5, 0x2}, {0x5}, {}, {0x3, 0x1}, {0x1}, {}, {0x5}, {0x4, 0x3}, {0x4, 0x1}, {0x7}, {0x0, 0x1}, {0x3}, {0x1, 0x2}, {0x5}, {0x2, 0x1}, {0x3}, {0x1, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {}, {0x4}, {0x2}, {}, {0x2}, {0x8, 0x1}, {0x4, 0x74dc92d6f1e3f6a5}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x5}, {0x1}, {0x7b9cdb99df53a394, 0x1}, {0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x1}, {0x4}, {0x5, 0x3}, {0x4}, {0x1, 0x1}, {0x7}, {0x5}, {0x5, 0x842d8b8369298249}, {0x3}, {0x0, 0x2}, {0x1}, {0x2}, {0x3, 0x1}, {0x1}, {0x5, 0x3}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x6fe1a378fc643c70}, {0x0, 0x1}, {}, {0xd8a7f27ab9189012, 0x2}, {}, {0x4}, {0x1, 0x3}, {0x2}, {0x2}, {0x1}, {0x2}, {0x0, 0x1}, {0x4}, {0x0, 0x78c658ed90404d03}, {0x1}, {0x6}, {0x5, 0x1}, {0x1, 0x3}, {0x1, 0x1}, {0x0, 0x1}]}}, @TCA_PEDIT_PARMS={0xee0, 0x2, {{{0x6, 0x54c1, 0x7, 0x40, 0x9}, 0x5, 0x40, [{0x1, 0xfff, 0x2, 0x9, 0x800, 0x3f}, {0x6, 0x2, 0x5, 0xe23, 0x1, 0x80000000}, {0x7ff, 0x0, 0x3, 0x5, 0x8000, 0xff}, {0x8, 0x1, 0x3, 0xa4b, 0xffff, 0x9}, {0x5, 0x1, 0x1, 0x200, 0x9, 0x81}, {0x218, 0x0, 0x2, 0x20, 0x2, 0x6}, {0x6, 0x40, 0x9, 0x7f, 0x0, 0x6}, {0x9, 0x401, 0x9, 0xbf7, 0x7, 0x1}]}, [{0x1f2a, 0xffff, 0x0, 0x8, 0x0, 0x10000}, {0x9, 0x3f, 0xb11, 0x1, 0x9, 0x5c1a}, {0x3, 0xc9ce, 0x8, 0x40, 0x7db, 0x800}, {0x5, 0x18c, 0x7, 0xfc, 0x0, 0x401}, {0x0, 0x935a, 0x80, 0x7, 0xff, 0x4}, {0xfffffffd, 0x8, 0x1, 0x8, 0x4, 0x2}, {0x4, 0x8, 0x80000000, 0x531, 0x7, 0x3ff}, {0x6, 0x2, 0x8000, 0x5, 0xff, 0x4}, {0xfffffffc, 0x6, 0x20, 0x8, 0x40, 0x4316}, {0x3, 0x7, 0x2, 0x4, 0x2, 0xba90}, {0x1f, 0xffffffe0, 0x3ff, 0x7, 0x7f, 0x7fffffff}, {0xff, 0xfffffff7, 0x5, 0xc51, 0x88, 0x7}, {0x3, 0x3, 0x6, 0x7, 0x9, 0x9}, {0x2, 0x2, 0xdd, 0x0, 0x4, 0x2}, {0x7fffffff, 0x3, 0x200, 0x9, 0xf9, 0x2658}, {0x507d, 0x2, 0x7fff, 0x4, 0x4, 0xe5b}, {0x5, 0x9, 0x0, 0x80000000, 0x401, 0xffff}, {0x800, 0x101, 0x10000, 0x0, 0x3, 0x3ff}, {0x3, 0x3, 0x8000, 0x9, 0x7, 0x7}, {0x80000000, 0x4, 0x101, 0x1, 0x1000, 0x1}, {0x7, 0x10000, 0x1f, 0x8, 0x3ff, 0xffffffff}, {0x81, 0x6, 0xccbb, 0x800, 0x1, 0x2}, {0x0, 0x95c, 0x1, 0x1, 0x8, 0x5}, {0x3ff, 0x80000001, 0x8, 0xc2, 0x3, 0xffffffff}, {0x8001, 0x6, 0x0, 0x0, 0x5, 0xfff}, {0x5, 0xfffffff8, 0x2, 0xffffffff, 0x0, 0x3}, {0x3b1, 0x1, 0x1, 0x5, 0x4, 0xfffff52b}, {0x101, 0x0, 0x200, 0x200, 0x101, 0x1f}, {0x8, 0x0, 0x8001, 0xff, 0x1f, 0x7}, {0x2, 0x6, 0x0, 0x3, 0x2, 0x1ff}, {0xfffffe01, 0x1, 0x2, 0x7f, 0x81, 0x5}, {0xa40, 0x2, 0x1c7, 0xa86, 0x1, 0x8}, {0x8, 0x6, 0x3, 0x0, 0x1, 0x8}, {0x73001ce8, 0x7, 0x9, 0x55, 0x947, 0x6}, {0x0, 0x7fffffff, 0xed94, 0xd22, 0x7ff, 0x3b}, {0x622b, 0x3, 0x4, 0x20, 0x7f, 0x1}, {0x1, 0x8001, 0x101, 0x81, 0x7, 0x40}, {0xe4, 0x7ff, 0x9, 0x7, 0x7}, {0x6, 0x23, 0xffff0001, 0x200, 0x0, 0x800000}, {0x0, 0x3, 0x5, 0x9b, 0x3ff, 0x93c}, {0x8001, 0x2, 0x101, 0x100, 0x8}, {0x2, 0xfffffffd, 0x3, 0x1cbe, 0x0, 0x80000001}, {0x8000, 0x400, 0x6, 0x35, 0xb452, 0x20}, {0x9, 0x0, 0x7ff, 0x9, 0x1f, 0x2}, {0x20000000, 0x6, 0x6, 0x7ff, 0x6, 0x8001}, {0x10001, 0x40, 0x3, 0x7ff, 0x8, 0x7f}, {0x4, 0x219, 0x1, 0x7fff, 0x4}, {0x8, 0x40, 0x9, 0x3, 0x4178, 0x9}, {0x1, 0xc2, 0x81, 0xfff, 0x2, 0xfd94}, {0x9, 0x5, 0x80, 0x50c, 0x80000000, 0x80000000}, {0xffff, 0xffffffc1, 0xffff, 0x8001, 0x8, 0xfe50}, {0xfffffffb, 0x6, 0x81, 0x8001, 0x5, 0xd19}, {0x4, 0x8001, 0x3ff, 0x5, 0x9, 0x7}, {0x5, 0xfffffff7, 0x400, 0x6, 0x2, 0x5}, {0x8, 0x80000000, 0x800, 0x1ff, 0x8, 0x1000}, {0x7, 0x8, 0x4, 0x7, 0xfffffff7, 0x200}, {0xffff8000, 0x200, 0x0, 0x8, 0x7a, 0x3}, {0x8, 0x8780, 0x9, 0x20, 0x100}, {0x5, 0x88e, 0x2, 0x2, 0x5, 0x7fffffff}, {0x5, 0x7, 0x1, 0x3, 0x1}, {0x5, 0x8, 0xa54df57, 0x80000001, 0x4, 0x5}, {0x463, 0xffff4eda, 0x400000, 0x4, 0x40000, 0x4}, {0x6, 0x3, 0x3, 0x957, 0x5, 0x6}, {0x101, 0x200, 0xe47, 0x121d, 0x40, 0x8fa}, {0x81, 0x9a25, 0x1, 0x7, 0x11f, 0x99f6}, {0xc1f1, 0x3, 0xffff0001, 0xa128, 0x9, 0x21}, {0x1a, 0x0, 0x7, 0x40, 0x7fffffff, 0x6}, {0x0, 0x3ff, 0x5, 0x1, 0x10000, 0xffffe4ce}, {0x7, 0x8000, 0x1, 0x7f, 0x2, 0x6939}, {0x1, 0xb3, 0x8, 0x1, 0x5ee, 0x7}, {0x3, 0xd500, 0xa19a, 0x8, 0x9, 0x9}, {0xffffffff, 0x3, 0xd83545dc, 0xffffff00, 0x0, 0x4}, {0x58000000, 0xd6ba, 0x8, 0x8, 0x8000, 0x1}, {0xadc, 0x20, 0x200, 0x9, 0x3, 0x9}, {0x8214, 0x6, 0x7fffffff, 0x1, 0x9, 0x8}, {0x4, 0x7, 0x8, 0x2, 0x1f, 0x4}, {0x7, 0x9, 0x978, 0x4, 0x5, 0x6}, {0x81, 0x7, 0x81, 0x9, 0x7b, 0x9}, {0x0, 0x401, 0x5d48, 0x3d, 0x5, 0x3}, {0x9, 0x9, 0x3b, 0x400, 0x40, 0x4}, {0x3, 0x1f0, 0x8000, 0x80000000, 0x2, 0xafdf}, {0x5, 0x4, 0x3, 0x6, 0x5b, 0x7ff}, {0x4, 0x3, 0x7916, 0x80000000, 0x40, 0x5}, {0x20, 0x27c8000, 0x8, 0x0, 0xfffffff9, 0x3f}, {0x8, 0x0, 0x7fff, 0x401, 0x80000001, 0x8000}, {0x8, 0x81, 0x8, 0xd6, 0x30bf, 0x7}, {0x3, 0x60, 0xfffff6fc, 0x81, 0x5, 0x9}, {0x3ff, 0x2, 0x40, 0x7, 0x400, 0x43}, {0x1e5, 0x5, 0x5, 0x6, 0xc73d, 0xf28b}, {0x5, 0x20, 0x1, 0x1, 0x6, 0x8000}, {0x2, 0x80, 0x3, 0x9, 0x7fff, 0x10000}, {0xfffffeff, 0xffff72d4, 0x8000, 0xffff, 0x1, 0xd4e}, {0x7, 0x7f, 0x9, 0x1, 0x8, 0x100}, {0x2, 0x3, 0x2, 0x7ff, 0xfffffff8, 0x5}, {0x3ff, 0x3260151f, 0x9, 0x400, 0xb9f5, 0x9}, {0x87, 0x3, 0xffff, 0xffffffff, 0x1, 0x7}, {0x2, 0x0, 0x1, 0x1998, 0x0, 0x1ff}, {0x2, 0xfffffffe, 0xfffffc01, 0x6c5c, 0x7, 0x4}, {0x800, 0x8, 0x9, 0x2, 0x1, 0x7}, {0x101, 0x6, 0x8, 0x9, 0x7fff, 0x10001}, {0x4, 0x4, 0x8, 0x5}, {0x3, 0x1, 0x7f, 0x9, 0x72b, 0x2}, {0x8, 0x9, 0xff, 0x800, 0x1000, 0x7ff}, {0x2, 0x1, 0x3, 0xff, 0xbde, 0x9}, {0x0, 0xfff, 0x5, 0xffffff81, 0x0, 0x2}, {0x2, 0x6d1, 0xfffffff8, 0x7, 0x3ac, 0x8}, {0x2, 0x1, 0x0, 0x0, 0x40, 0x656}, {0x10001, 0x3c66, 0x5, 0x7, 0x2, 0x7}, {0x9, 0xffffffff, 0xff, 0x100, 0x0, 0x3}, {0x273, 0x8000, 0x8, 0x5d2, 0x2, 0x2}, {0x760, 0x427bdf31, 0x18, 0x66f, 0x2, 0x3f}, {0x1c8, 0x6, 0x0, 0x4, 0x800, 0x401}, {0x4, 0x3, 0x1, 0x80, 0x3, 0xe0}, {0x80000000, 0xffffffff, 0x93a, 0x8001, 0x7ff, 0x7}, {0x1ff, 0x9, 0x98, 0x3, 0x2}, {0x6, 0x80000000, 0xffffff00, 0x8e13, 0x3, 0x54}, {0x80000000, 0x80, 0x4, 0x101, 0x9, 0x5}, {0x8, 0x80, 0x23ab, 0x80000000, 0x0, 0xffff393f}, {0x3f, 0x0, 0x101, 0x3, 0x200, 0xbb4}, {0x7, 0x401, 0x5, 0x8, 0x4, 0x6910}, {0x2, 0x0, 0x926, 0x4, 0x3, 0x7}, {0x31f, 0x386, 0x1ff, 0x4, 0x9}, {0x2, 0x1, 0x4, 0x1, 0x7, 0x9}, {0x6, 0xfffffffb, 0x5, 0x2, 0x80, 0x7}, {0x9, 0x7fffffff, 0x9, 0x1, 0x7ff, 0x2}, {0x1, 0x1, 0x0, 0x3ff, 0x4, 0xac}, {0x101, 0x2, 0xd9f, 0x800, 0x1, 0x1000}, {0x2d00, 0x4b, 0x4, 0x7, 0x4d, 0x101}], [{0x5}, {}, {0x2, 0x1}, {0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x3}, {0x2}, {0x0, 0x32c0a8916a9ee34d}, {0x11d5291a6a60609f}, {0x5}, {}, {0x0, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4}, {}, {0x5, 0x1}, {0x4, 0x2}, {0xee9598d8557bc835, 0x2}, {0x1}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x3}, {0x1}, {0x9}, {0x0, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {}, {0x1}, {}, {0x1a94f120717b64f4, 0x3}, {0x1}, {}, {0xc}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x2}, {0x4, 0x1}, {0x2}, {0x6}, {0x1}, {}, {0x0, 0x2}, {0x1}, {0x2, 0x1}, {0x1}, {0x99d74b2ab506a031, 0x9d35dc1248f0167}, {}, {0x4}, {}, {0x3}, {0x0, 0x1}, {0x4, 0x1}, {}, {0x5, 0x2}, {0x4}, {0x5, 0x3}, {0x4}, {0x2, 0x3}, {}, {0x3}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {0x1}, {0x3, 0x1}, {0x5}, {0x2}, {0x4, 0x1}, {0x3}, {0x66b5f0d741389b7c, 0x1}, {}, {0xf, 0x1}, {0x4, 0x3}, {0x2}, {0x2}, {0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x7, 0x1}, {0xcefed848cd3373f4}, {0x1}, {0x6}, {0x2}, {0x6}, {0x2, 0x1}, {0x5}, {0xb, 0x1}, {0x1}, {0x3, 0xd2d8080a605e8a7e}, {0x5}, {0x2dfcbbbc7f012535, 0x1}, {0x0, 0x2}, {0x4, 0x1}, {0x4}, {0x6, 0x1}, {0x5}, {}, {}, {}, {0x1}, {0x4}, {0x5, 0x3}, {0x4, 0x1}, {0x1}, {0x2}, {0x0, 0x1}, {0x5}, {0x5}, {0x2}, {0x830ec86a96e12e53}, {0x2, 0x3}, {0x91399abc54af4532, 0x3}, {0x5, 0x1}, {0x3}, {0x5, 0x1}, {0x3}]}}, @TCA_PEDIT_KEYS_EX={0x5c, 0x5, [@TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x2}]}, @TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}]}, @TCA_PEDIT_KEY_EX={0x1c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_CMD={0x8}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}]}, @TCA_PEDIT_KEY_EX={0x1c, 0x6, [@TCA_PEDIT_KEY_EX_CMD={0x8, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x8}]}]}, @TCA_PEDIT_KEYS_EX={0x24, 0x5, [@TCA_PEDIT_KEY_EX={0x14, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x8}]}, @TCA_PEDIT_KEY_EX={0xc, 0x6, [@TCA_PEDIT_KEY_EX_HTYPE={0x8, 0x1, 0x1}]}]}, @TCA_PEDIT_PARMS={0xe68, 0x2, {{{0x1, 0x0, 0x8, 0x2, 0x10000}, 0x0, 0x3, [{0x7, 0x80, 0xfffffffd, 0x80000000, 0x10001}, {0xe8d, 0x0, 0x20, 0xc4a, 0x53e, 0x3ff}, {0x6, 0x3, 0x2, 0x200, 0xffff, 0x100}]}, [{0x6, 0x309, 0x8, 0x30000, 0xb2, 0x7}, {0x3, 0xfffffffd, 0x6, 0x180000, 0x401, 0xffffffff}, {0x0, 0x9, 0x211b, 0xcee3, 0x8, 0x2}, {0x200, 0x10, 0xc1a2, 0x80000000, 0x5}, {0xfffffffb, 0xffffffff, 0x101, 0x1, 0x80, 0x1363}, {0x5, 0x7, 0x7, 0x758efbc7, 0x5, 0x3f000000}, {0xffff, 0x8, 0xffff8001, 0xfc000000, 0x10001, 0xfd9}, {0x80000000, 0x3f, 0x100, 0xfffc0000, 0xffff8001}, {0x2, 0xfffffffb, 0xfffffff8, 0x10000, 0x2, 0x2}, {0x6cd, 0x7, 0x1000, 0x1, 0x0, 0x9}, {0x4, 0xffffff66, 0x8001, 0x996d, 0x4, 0x4}, {0x4a4f, 0xab, 0x7f, 0x800, 0x40, 0x2}, {0x5, 0x1, 0x645, 0x4, 0x2, 0xffffff89}, {0x9, 0x4, 0x33, 0x5, 0x8, 0x8}, {0x1ff, 0xffff, 0x9, 0xff, 0x1, 0x7f}, {0xfff, 0x7, 0x0, 0x20, 0x16d5, 0x3}, {0x5, 0x47a, 0x2, 0x88, 0x3, 0x6}, {0x5, 0x78bd, 0x6, 0x7, 0x800, 0x3f}, {0xfffffc00, 0x101, 0x8, 0x6, 0x0, 0x58f058aa}, {0xa4, 0x53, 0x3, 0x9, 0x0, 0x800}, {0x8, 0xf0, 0x7, 0x0, 0x8, 0x8}, {0x4, 0x200, 0x0, 0x85df, 0x7fff}, {0x4, 0x5, 0x4, 0x6, 0x0, 0x85cb}, {0x0, 0xfff, 0x7fff, 0x4, 0x2, 0x3}, {0x3, 0x3659, 0x9, 0x1, 0x8, 0x2}, {0x72, 0x92, 0x5, 0x9, 0x5, 0x80000001}, {0x4, 0x3, 0xcc, 0x10000, 0x80000000, 0x7f}, {0x200000, 0x3, 0x80, 0x80, 0x1f, 0x200}, {0xffffffff, 0x9, 0x1, 0x7f, 0xfffffffc, 0x2}, {0x5, 0x2ddf, 0x5, 0x614, 0x9, 0x5}, {0x400, 0x0, 0x2, 0xc390, 0x7fff, 0xb57b}, {0x1000, 0x81, 0x0, 0x10001, 0x2, 0x800}, {0x2, 0xffff, 0x10001, 0x7, 0x0, 0x6833}, {0x4, 0x8001, 0x40000000, 0x8, 0xffff, 0x6}, {0x4, 0x10000, 0x400, 0xfffffffa, 0x6}, {0x4b772d9, 0x7, 0xf48e, 0x80, 0x8001, 0x5}, {0x7f, 0x4, 0x3, 0x8001, 0x7, 0x400000}, {0x7, 0x0, 0x1, 0x10000, 0x3, 0x1ff}, {0x10000, 0x1, 0x10000, 0x40, 0x4, 0x7fffffff}, {0x1, 0x2, 0xffffffff, 0x52, 0x0, 0x1000}, {0x4, 0x4, 0x3f, 0x0, 0x7fffffff, 0x3}, {0x3ff, 0x5, 0x77, 0x3, 0x10000, 0xffffffff}, {0x4, 0xffffae31, 0x8, 0x4, 0x800, 0x652c}, {0x8001, 0x1, 0x9, 0x4, 0x400, 0x2}, {0x3, 0xffff, 0x2, 0x81, 0x5, 0x10000}, {0x7, 0x2, 0x1ff, 0x0, 0x5}, {0x6, 0x7f, 0x400, 0x7, 0x7, 0x5}, {0x80000000, 0x7, 0x7fffffff, 0xfffffff7, 0x3, 0x458}, {0x3, 0x4, 0x40, 0x6, 0x80, 0x5}, {0x7, 0x6, 0x0, 0x0, 0x9, 0x1}, {0x48000, 0x20, 0x7, 0x7, 0x40, 0x8}, {0x0, 0xca0, 0x238, 0x6e3, 0x5, 0x2}, {0x6, 0x5, 0x5, 0x0, 0x1f, 0x81}, {0x7, 0x2, 0x0, 0x2027, 0x3ff80, 0x80000001}, {0x8, 0x401, 0x1000, 0x4, 0x35a3}, {0x7, 0x80000001, 0x9, 0x8, 0xa8c8, 0xdf9}, {0x10001, 0xcf6, 0x3f, 0x1, 0x8, 0xfffffffe}, {0x4, 0xfa, 0x800, 0x8, 0x10001, 0x3}, {0x8, 0xff, 0x8000, 0x1ff, 0x1, 0x60b1}, {0x6, 0x7f, 0xffffffff, 0x80, 0x8, 0xffffffff}, {0x100, 0x10001, 0x3f, 0x100, 0xfffffffc, 0x6}, {0x0, 0x7ff, 0x8, 0x1, 0x80000001, 0x400}, {0x400, 0x10000, 0x80000001, 0x9, 0x1}, {0x10000, 0xc8, 0x7, 0x1, 0xc641, 0x1ff}, {0x745280b0, 0x4, 0x3, 0x401, 0x5, 0x1}, {0x4, 0x7f, 0xff, 0x286, 0x2, 0x1}, {0x9, 0x3, 0x707dc47a, 0x80000000, 0x800, 0x20}, {0xcbcb, 0x0, 0x0, 0x7, 0x5, 0x3}, {0x0, 0x4, 0x1, 0x3, 0x401, 0x2}, {0x8000, 0x3ff, 0x8, 0x1, 0x8000, 0x7fffffff}, {0x200, 0x401, 0x4, 0x101, 0x800, 0x9}, {0x6, 0x6, 0x0, 0x3, 0x3, 0x1}, {0x61, 0x5, 0x7fffffff, 0x6, 0x9, 0xf49c}, {0x51a, 0x800, 0x5, 0x567, 0xffffffff, 0x9}, {0x6, 0x7f, 0xfffffffa, 0x6052, 0x1}, {0x0, 0x2, 0x800, 0x6, 0x3, 0x5c5}, {0x2, 0x101, 0x6, 0x5, 0x8, 0x4}, {0x4, 0x1, 0x283, 0x1, 0x9, 0x6}, {0xffffffff, 0x3, 0x3f, 0x7, 0x81, 0x28a}, {0xe80, 0x100, 0x4, 0x10000, 0x8, 0x6}, {0x2, 0xfaf7, 0xa8f1, 0x6, 0xb1, 0x7}, {0x2, 0x20, 0x400, 0x0, 0x3, 0x1f7}, {0x8, 0x9, 0x3cb5, 0x0, 0x7, 0x7}, {0x7, 0xdc, 0x0, 0x7fff, 0x3, 0x800000}, {0xfffffffc, 0x3f, 0x529, 0x3ec, 0x4}, {0x5, 0xffffffff, 0x41f0, 0x0, 0xfffffffe, 0x1}, {0x3, 0xac, 0x3, 0x9, 0xff, 0x1ff}, {0x800, 0x5, 0x2, 0x2, 0x23f3, 0x40}, {0xffffffff, 0x800, 0xd243, 0x3e, 0x0, 0x4}, {0x2, 0x4, 0xffff7690, 0xffffffff, 0xb78, 0x5}, {0x8, 0x101, 0x7fff, 0x1a2b9074, 0x9, 0x7}, {0x8001, 0x80000001, 0xa7d, 0x80000001, 0x100, 0xa342}, {0x1ff, 0x3, 0x0, 0x1, 0x8, 0x708}, {0x0, 0x6, 0x80, 0x6, 0x0, 0x5}, {0x8000, 0x1, 0x0, 0xe00, 0x3, 0x10001}, {0x3, 0x3, 0x1, 0x27, 0xfffffffd, 0x3}, {0xee, 0xcf66, 0x65d, 0x553, 0x0, 0x6}, {0x1, 0x100, 0x0, 0x80000000, 0xddad, 0x5}, {0x400, 0x3ff, 0x0, 0x20, 0x5, 0x3}, {0x2, 0x40, 0x3, 0x6, 0xe37, 0x5}, {0xe9, 0x2, 0x4, 0x9, 0x221, 0x20}, {0x7e, 0x0, 0x61f5, 0x6b7d, 0x2}, {0x3, 0x4, 0x3f, 0x4, 0x2, 0x60b9}, {0xffffffff, 0x0, 0x3, 0xa5, 0x0, 0xeb9}, {0xf7d, 0xab152264, 0x80000001, 0x1ff, 0xa2, 0x400}, {0x6, 0x0, 0xfffffff9, 0x48c5, 0x3, 0x7ff}, {0xff, 0x7, 0x6, 0xdd3, 0xfbe, 0x764}, {0x3, 0x5, 0x80000001, 0x0, 0x40, 0x2}, {0x700000, 0x6, 0x10000, 0x6, 0x100, 0x6}, {0x4, 0x2, 0x7, 0x2, 0x4}, {0x3ff, 0x3ff, 0x20, 0x80000001, 0x7, 0x8}, {0x16, 0x800, 0x0, 0x80000001, 0x1e4000, 0x1ff}, {0x0, 0x0, 0x3, 0x7, 0x0, 0x4}, {0x7fff, 0x200, 0x3, 0x6, 0x0, 0x20}, {0x7fff, 0x5, 0x8, 0x80000000, 0x40, 0x800}, {0x0, 0x800, 0x8, 0x2, 0x6, 0x401}, {0x1ff, 0x0, 0x6, 0x92, 0x7, 0x7}, {0x9, 0x1, 0x7fffffff, 0xa72, 0x4, 0xdda}, {0xf5e6, 0x5, 0x4f1de4dd, 0x0, 0xa3ff, 0x5}, {0x1, 0x7fff, 0x3ff, 0x3f, 0x5, 0x5}, {0x6, 0x7, 0x5, 0x1, 0x5, 0x1}, {0x8, 0x800, 0x600c249b, 0x8000, 0x6, 0x7fff}, {0x401, 0x8, 0x8000, 0x3ff, 0xc4eb, 0xfff}, {0x9, 0x7ff, 0x0, 0xff, 0x8001}, {0x7fff, 0x938, 0x1ff, 0x0, 0x4, 0x80}, {0x0, 0x6, 0x1f, 0x8, 0x2}, {0x1, 0x3f42, 0x0, 0x7ff, 0x2, 0x8000}, {0x7, 0x3e1138fa, 0xffffffff, 0x8000, 0x3, 0x8000}], [{0x6, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x2, 0x9978974d856ed8b}, {}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {0x7}, {0x0, 0x2}, {0x0, 0x1}, {0x5, 0x3}, {0x0, 0x1}, {0x5}, {0x5}, {0x3}, {0x4}, {0x0, 0x3}, {0x2, 0x1}, {0x0, 0x2}, {0x2}, {0x1, 0x1}, {0x3, 0x3}, {0x1}, {0x0, 0x1}, {0x3}, {0xded8ad52ff4e3ffe, 0x1}, {0x2, 0x1}, {0x4}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {}, {0x0, 0x1}, {0xf, 0x3}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x5}, {0x5, 0xe3516cef5532b508}, {0x3, 0x3}, {0x2}, {0x1, 0x1}, {0x1}, {0x68eae20404178c8c, 0x3}, {0xdfccb64575089e62}, {0x5}, {0x3, 0x1}, {0x2, 0x3}, {0x3, 0x1}, {0x5}, {0x3}, {0x2, 0x1}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {0x3}, {0x3}, {0x4}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0xaad9e33d5127f0da, 0x1}, {0x0, 0x76cca1421e06cf39}, {0x27c90de1aac8c68b}, {0x0, 0x1}, {0x4}, {0x3, 0x1}, {0x6, 0x3}, {0x0, 0x1}, {0x5, 0x1}, {0x4, 0x3}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x2, 0x3}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x0, 0x2}, {0x2}, {0x4, 0x7545ace5e5898bc5}, {0x5}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4}, {0x4, 0x1}, {0xe443d8bc74fa7ad9}, {0x1}, {0x5, 0x1}, {0x1}, {0x5}, {0x1, 0x2ac8216b9200dbb2}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x2}, {0x1}, {}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x2}, {0x5}, {0x5, 0xf513a83bc488b6dd}, {0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x5, 0x3}, {}, {0x5}, {0x5}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {0x2, 0x1}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x1}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x1a, 0x5, 0xfffffffffffffffa, 0x2, 0x4}, 0x0, 0xff, [{0x7f, 0x6, 0x81, 0x8, 0x1, 0x9}, {0x227f2338, 0xfff, 0x3, 0x5, 0x4, 0x33}, {0x4, 0x400, 0xc0, 0x4, 0x3, 0x200000}]}, [{0xac, 0x54, 0x6, 0x6, 0x1, 0x1}, {0x20, 0x44f, 0x5, 0xd6dc, 0xe8, 0x6}, {0x80000000, 0x88a, 0x1f, 0x2, 0x3ff, 0x1000}, {0x0, 0xfffffffe, 0x0, 0xfffffff7, 0xe0c040, 0x3f}, {0x8000, 0x7, 0x8, 0x8, 0x2, 0x8}, {0x9566, 0x305, 0x73, 0x72, 0x7fffffff, 0xf22}, {0x8001, 0x2, 0x4, 0x1, 0xffffffff, 0xae9}, {0x8, 0x401, 0x2, 0x2, 0xfffffff9}, {0x5, 0x1000000, 0x3f, 0x1, 0x9, 0x80}, {0x101, 0xfff, 0x3, 0x1, 0x6e7, 0x9}, {0x8, 0x9, 0x0, 0x2, 0xfffffffb, 0x5}, {0x7fff, 0x30fc, 0x2, 0x20, 0x9}, {0x2, 0x0, 0x7, 0x6, 0x8001, 0x5}, {0x80, 0x9, 0x6, 0x4, 0x0, 0x1}, {0x6, 0x800, 0x2, 0x200800, 0x0, 0xfffffffd}, {0x3ff, 0x0, 0x1ff, 0x7, 0x8, 0xffffff81}, {0xffffffff, 0x4, 0xf72, 0x3, 0x10000, 0x10001}, {0x81, 0x80, 0x3ff, 0x8001, 0x5, 0x9}, {0x7, 0x6, 0x9f, 0xfff, 0x7fffffff, 0x80000001}, {0x7, 0x2, 0x80000000, 0x4, 0x7, 0x4}, {0x9, 0x5, 0x7, 0x47e00000, 0x1ff, 0x81}, {0x7, 0x7ff, 0x1, 0x1, 0xda8, 0x7ff}, {0x1, 0x96, 0x800, 0x8, 0x7, 0x3}, {0x43, 0x80000000, 0x800, 0x4, 0xffffff01, 0x1}, {0x6, 0x0, 0x5b46, 0x6, 0x5, 0x32d}, {0x26f, 0xddc, 0x6, 0x401, 0x80, 0x1000}, {0x22, 0x9, 0x0, 0x6, 0x5, 0x400}, {0x43, 0x1ff, 0x7fffffff, 0x6, 0xc30, 0x1}, {0x7fff, 0x5, 0x7, 0x0, 0x3ff, 0xfffeffff}, {0x4, 0x6, 0x6, 0x4, 0x81, 0x6}, {0x4, 0x6fe9c876, 0x400, 0x80000000, 0xd4, 0x5}, {0x9, 0x9e1b, 0x8c, 0x7fff, 0x2, 0x4}, {0xe077, 0x8, 0x40, 0x8001, 0x3}, {0x3, 0x20, 0x0, 0x7dd5, 0x3, 0xff}, {0x2, 0x2, 0x7, 0x3515, 0x3, 0x1000}, {0x2, 0x9, 0x8, 0x8, 0x8, 0xffff}, {0x0, 0x4, 0x7f, 0x7ff, 0xb49, 0xfbb}, {0x401, 0x250, 0x9, 0xe00000, 0x0, 0x5}, {0xb7, 0x99dd, 0x32278cf7, 0x78a, 0xfc5, 0x7}, {0x7, 0xffffffff, 0x6, 0x401, 0x0, 0x6}, {0x1, 0x81, 0x9, 0x7, 0x1, 0x7}, {0x2, 0xfff, 0x8, 0x8001, 0x8001, 0x3}, {0x7fff, 0x1, 0x7, 0x5, 0x1, 0x20}, {0xffff, 0x0, 0x2, 0xffff, 0x7fff, 0x635}, {0x6, 0x10000, 0x6, 0xfffffff7, 0x4, 0x8}, {0x80000000, 0x40, 0x8, 0x80000001, 0x1ff2, 0x3}, {0x3, 0x800, 0xfffffff8, 0x7, 0x6, 0x5}, {0xd3, 0x4, 0x9, 0x32, 0x20, 0x5a1}, {0x8001, 0x5f, 0x382, 0x3, 0xfff, 0x6}, {0x1239ea6f, 0x0, 0x3, 0x5, 0x10001, 0xffff}, {0x6, 0x3, 0x200, 0x1, 0xffffff80, 0x5}, {0xdb, 0xb0c, 0x7fff, 0x8, 0x1d, 0x298}, {0x7fff, 0x7, 0x8, 0x7, 0x4, 0x1ff}, {0x401, 0x7, 0x0, 0x8001, 0xfff, 0x4b8}, {0x4, 0xffff, 0x10000, 0x101, 0x0, 0x8}, {0x5ffe, 0x7, 0xfff, 0x80000000, 0xfffffffa, 0x8}, {0x4, 0x5, 0x0, 0x800, 0x4, 0x2}, {0x100, 0x6, 0x3f, 0x7fffffff, 0x4, 0x7fffffff}, {0x8000, 0x69e, 0x80, 0x8, 0x8001, 0x8}, {0x41, 0x7, 0x200, 0x3ff, 0x2, 0x3}, {0x5, 0x8, 0xcf9, 0x2, 0x8, 0xd963}, {0x3, 0x9, 0xffff, 0x2, 0x7fff, 0x8}, {0x6e4, 0xffffffff, 0x400, 0x7, 0x9}, {0x6, 0x4b, 0x5, 0x0, 0x9, 0x40}, {0x3f, 0x9, 0x3da, 0x8001, 0x6, 0x5}, {0x8001, 0x217e, 0x8, 0x9, 0x3ff, 0x5485}, {0x7ff, 0x2d5e, 0x7, 0x2, 0x1f, 0x3}, {0x1, 0x5, 0x0, 0x80000000, 0x4}, {0xff, 0x2, 0x1f, 0x604, 0x4, 0x9}, {0x5, 0x4c9, 0x7, 0x6, 0x1, 0x42a}, {0x8, 0x10000, 0x33, 0x9, 0x7, 0x79a470b0}, {0x7, 0x0, 0xaa4, 0x9, 0x10000, 0xc794}, {0x5, 0x6, 0x7, 0x9, 0xef65, 0x1}, {0x0, 0x8c, 0x5, 0x101, 0xfffffffe, 0x1}, {0x1ff, 0x9, 0x2, 0x1f, 0xfffffffe, 0x100}, {0x5, 0x4, 0x1000, 0x7, 0x32b, 0x7}, {0x400, 0x1, 0x2, 0xfffffff9, 0x800, 0x1}, {0x7fffffff, 0x0, 0x1648, 0x1f, 0x3, 0x5}, {0x6, 0x9, 0x6, 0x80000001, 0x1f, 0x9}, {0x1000, 0x0, 0xa728, 0x2, 0x97, 0x8}, {0x2, 0x4a, 0x7, 0x6, 0x5, 0x3}, {0x8, 0x6, 0x2, 0x4, 0x2, 0x9a}, {0x5bb, 0x7fffffff, 0x0, 0x6ae5, 0x2, 0xc94}, {0xc851, 0x3, 0x5dce7406, 0x9, 0x1, 0x539}, {0x17e, 0xfffffff7, 0x200, 0x2, 0x0, 0x2}, {0xc7a00000, 0x7, 0x5, 0x1c9, 0xc8, 0x200}, {0x9, 0x10000, 0xc54, 0xfffffffb, 0x101}, {0x6, 0x1, 0x401, 0x401, 0x8, 0x4a4}, {0x0, 0x0, 0xc59, 0x7ff, 0x1, 0x2}, {0x4, 0x5, 0x80000001, 0x101, 0x7, 0x101}, {0x0, 0x9, 0x8, 0x0, 0xfff, 0x7}, {0xdf06, 0x2, 0xdd5, 0x3, 0x7, 0x8000}, {0xef1, 0x200, 0x1f, 0xb7, 0x81, 0x40}, {0x2, 0x40000000, 0x1f, 0x10001, 0x0, 0x80000001}, {0x42bbc25a, 0x7, 0x0, 0x6, 0xc00, 0xfffffff7}, {0x5, 0x1, 0x9, 0x4, 0xf03, 0x3}, {0xffff, 0x24de, 0x1, 0x10000, 0x200, 0x401}, {0x8, 0x7, 0x9, 0x800, 0x1f, 0x2}, {0x6, 0x0, 0x9, 0x1000, 0xcd, 0x3}, {0x7f, 0x101, 0x8, 0x5d, 0x7, 0x2}, {0x3569, 0x9, 0x0, 0x7, 0x8, 0x4}, {0x81, 0x80000001, 0x1, 0x9, 0xcc, 0x1}, {0x0, 0x80000001, 0x10001, 0x5, 0x54e27d9d, 0x7}, {0xc707, 0x8, 0xfff, 0x3, 0x26a39a56}, {0x40, 0x50, 0x7, 0x4, 0x7, 0x8b}, {0xc0a, 0x7, 0xfff, 0x5, 0x81, 0x3}, {0x4, 0x4, 0xfffffff7, 0x8001, 0x1, 0x80000001}, {0xf54b, 0x9, 0x0, 0x7ff, 0x4, 0xffff}, {0xfffff001, 0x10000, 0x9, 0x0, 0x3, 0x3}, {0x8, 0x7fff, 0x8001, 0x101, 0x4c43af16, 0x2}, {0x9, 0x3, 0x0, 0x800, 0x1000, 0xe89}, {0x3ff, 0x3ff, 0x5, 0x0, 0x10000, 0x100}, {0x10000, 0xffffffe2, 0x1, 0x7b957908, 0x9, 0x691c}, {0x0, 0x20, 0x7ff, 0x0, 0xff, 0x3}, {0x2, 0x80000000, 0x1f, 0xffff89ef, 0x6, 0x7}, {0xa1, 0x1, 0x8, 0x20, 0x2, 0x200}, {0xffffff00, 0x35, 0x3, 0x7, 0x80000000, 0x6}, {0x5, 0x4ea, 0x61, 0x10000, 0x4, 0xfffffff7}, {0x80000000, 0xffffff81, 0x101, 0xfffffffb, 0xc6, 0x7f}, {0x4, 0x26, 0x8, 0x7, 0x4, 0xfff}, {0x2, 0x1, 0x1, 0x3, 0x1, 0xffff}, {0x1, 0xffffffc0, 0x5, 0xffff, 0xffff895e, 0x7f}, {0x1, 0x7d, 0x6, 0x3, 0xba4, 0x5}, {0xfffffffd, 0x8, 0x8000, 0x1, 0x8, 0xffff8000}, {0x5, 0xdec8, 0x20, 0x9, 0x7, 0x198}, {0x2, 0x0, 0x200, 0xd81b, 0x2, 0xc7}, {0x5, 0x8, 0x297, 0x9f, 0x8c, 0x3}, {0xaa, 0x46a, 0x8000, 0x80000001, 0x1, 0x9}], [{0x1}, {0x0, 0xa68fe0526bbd2fb3}, {0x5}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x6, 0x1}, {0x8d2090de29ece9c0, 0x1}, {0x7}, {0x5}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2}, {0xa39cdb9cb71f7be4}, {0x4}, {}, {0x3}, {0x1, 0x3}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x3, 0x3}, {0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x139171ebda82f41}, {0x9, 0x1}, {0x3, 0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {}, {0x2, 0x2f21e8c0a81a1f09}, {0x1, 0x1}, {}, {}, {0x0, 0x1}, {0x4}, {0x2, 0x1}, {}, {0x1}, {0x2, 0x1}, {0x1}, {}, {0x2}, {}, {0x5}, {0x5, 0x1}, {0x7, 0x1}, {0x2}, {0x2, 0x2}, {}, {0x5}, {0x3, 0xaa6827a8dccb02ca}, {0x3}, {0x5, 0x7afb27130532eef4}, {0x3, 0x1}, {0x5, 0x59bcb2329b5d9e0e}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0xd}, {0x3}, {0x3, 0x2}, {}, {0x2, 0x1}, {0x3}, {0x0, 0x1}, {0x5}, {0x2, 0x2}, {0x6, 0x1}, {}, {0x2}, {0x5}, {0x6, 0x1}, {0x3}, {0x0, 0x7760770e221f28e9}, {0x0, 0x1}, {0x1, 0x1}, {0x4, 0x2}, {0x2}, {0x2, 0x964cfc7c90e7943b}, {0x0, 0x1}, {0x5}, {0x2}, {0x3, 0x3bfa7ec89514849b}, {0x2, 0x1}, {0x4, 0x3}, {0x0, 0x2}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {0x3, 0x14ba606aa80731ab}, {0xd}, {0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1ad86d236f511e8b}, {0x5}, {0x5, 0x255c1e6005f2ed39}, {0x1, 0x2}, {0x1}, {0x0, 0x1}, {0x4b56c1081f3ece9c}, {0x2, 0xcbdaff46c72ac516}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {0x6}, {0x2, 0x1}, {0x0, 0xb4d5fd17090aaf6b}, {0x4}, {0x3}, {0x2, 0x2}, {0x3, 0x2}, {}, {0x5, 0x1}, {0x5}, {0x2}, {0x4}], 0x1}}, @TCA_PEDIT_PARMS={0xee0, 0x2, {{{0x5, 0x2, 0x5, 0x4, 0x1da}, 0xbc, 0xf9, [{0x9, 0x8001, 0x8, 0x9, 0x61, 0x5}, {0x4, 0x81, 0x6, 0x2, 0x4, 0x5}, {0x6, 0x401, 0xe7f9, 0x7, 0x9, 0x7b9a}, {0x7, 0x80, 0x3, 0x3, 0x0, 0x400}, {0x3d7, 0x4, 0x80000000, 0x0, 0xfffffffe, 0x7ff}, {0x80000001, 0xe79, 0x4, 0x8, 0x8, 0x410b83c7}, {0x1b08, 0x7fff, 0x3, 0x2, 0x7fff, 0x8}, {0x0, 0x3, 0x7f, 0x7, 0x800, 0x1ff}]}, [{0xffffbe5b, 0x1, 0x5, 0x8, 0x0, 0x79}, {0x81, 0x1, 0x7, 0xdd, 0x2a, 0x2}, {0x0, 0x4, 0x9, 0x1, 0x5, 0x7}, {0xf22, 0x8, 0x8, 0x6, 0x5, 0x1ff}, {0x20, 0x7, 0x6, 0x6, 0x1, 0x10001}, {0x4, 0x580a, 0x0, 0x3, 0x20, 0x400}, {0xfffffffd, 0x7, 0x5, 0x3f, 0x2, 0x5}, {0x2f4b1e5, 0x1000, 0x4, 0x0, 0x0, 0x1}, {0x3, 0x3f, 0xff, 0x6, 0x9a7, 0xffff8814}, {0x10000, 0x1, 0x1, 0x7, 0x1, 0x3}, {0x5, 0xb0c9, 0xfff, 0x0, 0x8, 0x7}, {0xa16, 0x8, 0x0, 0x5, 0x9, 0x7}, {0x1, 0x9, 0xfffffffd, 0x7f, 0x1bc, 0x4ff}, {0x4, 0x7f, 0x80, 0x0, 0x7, 0x3}, {0x9, 0x4, 0x4, 0x2, 0x9b3c, 0x1}, {0x8001, 0xfffffffd, 0x3, 0x1, 0x2}, {0x80000000, 0x3, 0x1, 0x1, 0x3, 0x5}, {0x5, 0x0, 0x1, 0x58e, 0x4, 0x3f}, {0x38000000, 0x4, 0x100, 0xff, 0xa3, 0xffffff00}, {0x401, 0x5, 0x2b083f64, 0x722, 0x100, 0x8}, {0x8, 0x5, 0x100, 0x8, 0x1b, 0x8}, {0x6d, 0x2, 0x80000000, 0x8, 0x7}, {0x7, 0x401, 0x7f, 0x800, 0x3, 0x2}, {0x1f0000, 0x6, 0x7fffffff, 0x719, 0xffffffff, 0x200}, {0x8f2, 0x1, 0xffffffff, 0x1, 0x10001, 0xf90}, {0x1, 0x1, 0x5, 0x20, 0x8, 0x5}, {0x5, 0x20, 0x101, 0x3, 0x7f, 0x74c9}, {0x634, 0x1, 0x7fffffff, 0x8, 0x8, 0x1}, {0x7, 0xfc, 0x101, 0x3, 0x1}, {0x3, 0x81, 0x5, 0x1, 0x4, 0x1}, {0x3, 0x3f, 0xe18, 0x3ff, 0x7, 0x17}, {0x63, 0x1000, 0x8001, 0x7cf74424, 0x7, 0x8}, {0x1, 0xfffffff8, 0x80000001, 0x2, 0x7, 0x6}, {0x72f, 0x7f, 0x10000, 0x1f, 0x92a8, 0x400}, {0x1, 0x8, 0x3, 0xfffffffc, 0x8, 0x5f5}, {0x7, 0x2, 0x1f, 0x101, 0x1, 0x67a8}, {0xfc5c, 0x4, 0x4, 0x8, 0x5, 0xff}, {0x2, 0x5, 0xffffffff, 0x6, 0x7, 0x4}, {0x40, 0x9, 0x1f, 0x0, 0x4, 0x3}, {0x2, 0x4, 0x81, 0x6, 0x6, 0x4b}, {0x4, 0x8, 0x5, 0x8, 0x2, 0x6e3d36a8}, {0x9, 0x3, 0x8, 0x7, 0xfff, 0x7}, {0xffffffff, 0x457b1d9f, 0x81, 0x0, 0x2f0d}, {0xffffffff, 0x0, 0x101, 0x1, 0x1, 0x8}, {0x9, 0x101, 0x8, 0x5, 0x6b77b8a, 0xfff}, {0x0, 0xfff, 0x101, 0x2, 0x0, 0x8001}, {0x9, 0xff71, 0x7, 0x80000000, 0x7ff, 0xc8}, {0x3, 0x200, 0x100, 0x6, 0x7f, 0x7fffffff}, {0xfff, 0x48000, 0xfffffff9, 0xf33, 0x1, 0x1}, {0x9, 0x1, 0xfffff906, 0x7da, 0x8000}, {0x7, 0x3ff, 0x7ff, 0x7, 0x1, 0x6}, {0x92, 0xcdc, 0x1, 0x5710d72e, 0x7fffffff, 0x7}, {0xfff, 0x2, 0x8, 0x61, 0x401, 0x2}, {0x8c9, 0x7fff, 0xfffffffd, 0x5610, 0x4, 0x2}, {0x372b, 0xa10c, 0x3, 0x7, 0x60b25731, 0x8001}, {0xffffffff, 0x81, 0x6, 0x54, 0x5, 0xff}, {0x8, 0x886, 0x5, 0xffff}, {0xaaf, 0x0, 0x40, 0x0, 0x9, 0x9b6}, {0x2, 0x5, 0x1, 0x248, 0x4, 0x200}, {0x9, 0x9, 0x101, 0x0, 0x2, 0x7}, {0x82, 0x1, 0x5, 0x3, 0x9, 0xffffb269}, {0x3, 0x987, 0x7, 0x7, 0x6, 0x9}, {0x672, 0xdf5, 0x7, 0xfff, 0x0, 0x10001}, {0x40, 0xadab, 0x80, 0x3, 0xd553, 0x81}, {0x80, 0x7fff, 0x1, 0xdff86950, 0x1, 0xfbb}, {0x94cc, 0xfe4, 0x3f, 0x785, 0x80000000, 0x3ff}, {0xffff7fff, 0x401, 0x3ff, 0x3, 0xffffffff, 0x3}, {0x2, 0x2, 0x3, 0x1, 0x65, 0xffffffff}, {0x4, 0x101, 0x7, 0xffff, 0x7, 0xf48b}, {0xfffffffe, 0x8001, 0x4c4, 0xfffff800, 0x6, 0x6}, {0x2, 0x7, 0x5, 0x0, 0x5, 0x100}, {0x5, 0xffff, 0x0, 0x6d80, 0xfffffff7, 0x3}, {0x60, 0x81, 0x0, 0x9, 0xaf, 0x7ff}, {0x5fa7cddb, 0x0, 0x25c, 0x3ff, 0x2, 0x5}, {0x9, 0x1, 0x31c2, 0xd9, 0x3}, {0xaa, 0x1, 0x9, 0x6ec2, 0x3, 0x8}, {0x2, 0x8, 0x7, 0x1, 0xfb1c908a, 0xfc2}, {0x7, 0xa70, 0xfffffe01, 0x4, 0x1f, 0x240}, {0x8, 0x8, 0x0, 0x10001, 0x0, 0x10000}, {0x40, 0x5, 0x800, 0x100, 0xd4, 0x7ff8000}, {0xffffffe0, 0x400, 0x6, 0x81, 0x2, 0xa1d}, {0x0, 0x1, 0x2, 0x0, 0x9, 0x4}, {0x0, 0x2, 0x516, 0xafcddfd3, 0x3, 0xfffffffa}, {0x89c, 0x9, 0x1, 0x8001, 0x2, 0x1}, {0x8, 0x2, 0x1804bcb9, 0x20, 0xff, 0x5}, {0x8, 0x40, 0x8, 0xffffff3d, 0x8, 0x800}, {0x8a1e, 0x9, 0x313, 0x6, 0x9d4, 0x7fffffff}, {0x8, 0x3, 0x5, 0x9, 0x774, 0x7}, {0x1, 0x0, 0x40, 0x2, 0x2, 0xb9}, {0x7ff, 0x1ff, 0x3, 0x40, 0x800, 0x7}, {0x5, 0x5, 0x9, 0x9, 0x4, 0x7}, {0xeb17, 0x9, 0x200, 0x2, 0x0, 0x8}, {0x3, 0x6a8, 0x6, 0x80000001, 0xffff0000, 0x2}, {0x101, 0x9, 0x1, 0x9, 0x5, 0x5}, {0x9, 0x2, 0x1ff, 0x9, 0x5, 0x6}, {0x5, 0x8722, 0x5, 0x2, 0x7f}, {0x2, 0x5, 0x4, 0xd, 0x8, 0x8}, {0xbf, 0x200, 0x20f, 0x5, 0x8000, 0x2}, {0x4, 0x4, 0x7, 0x8000, 0xffff0000, 0x9}, {0x20, 0x5, 0x8000, 0x1, 0x3, 0x1}, {0x4, 0x5, 0x1, 0xfffffffe, 0x6d32, 0x9}, {0x3, 0x4, 0x1ff, 0x80, 0x92, 0xffffffff}, {0x0, 0x5, 0x7, 0x6, 0x8}, {0x3, 0x5, 0x3, 0x9, 0x6, 0x6}, {0x10001, 0xfffffff7, 0xffffffff, 0xc0, 0x6, 0x10001}, {0xffffffff, 0x2, 0x8, 0x401, 0xf45a, 0x4}, {0x6d71, 0x7, 0x5cf4, 0x5, 0x80, 0x6}, {0x4, 0x4, 0xffffffff, 0xf0, 0x200, 0x6}, {0x8000, 0x4, 0x2, 0x9, 0x7, 0x7f}, {0x2, 0x0, 0x3, 0x1c, 0x7, 0x80000000}, {0x40, 0x0, 0x2, 0x3, 0x7, 0x7ff}, {0xc7b9, 0x1ff, 0x9, 0x8, 0x5}, {0x0, 0x0, 0x9, 0x5, 0x9faf, 0x1}, {0x8, 0xc73, 0x1, 0x88, 0x2, 0x4}, {0x4, 0x0, 0x1, 0x1, 0x0, 0x6}, {0x0, 0x6, 0x400, 0x80000001, 0x800, 0x5}, {0x9, 0x5, 0x4, 0xffff, 0x2, 0x5b2}, {0x7, 0x3, 0x401, 0x7, 0x40, 0x4}, {0x80000000, 0x5, 0x1, 0x1000, 0x8, 0x1}, {0x50000, 0xffffffff, 0x7, 0x563d, 0xa2a, 0x100}, {0x6, 0x7, 0x76, 0x7fffffff, 0x4, 0x6}, {0x6, 0x5, 0xd1a, 0x80, 0x200, 0xf7}, {0x100, 0x6, 0x1, 0x3, 0x6, 0x8}, {0x9, 0x6, 0x401, 0x55, 0x0, 0x90d}, {0x2, 0x10000, 0x9, 0x993c, 0x5, 0x6}, {0x5, 0x6, 0x7, 0xb0, 0x400, 0x9}, {0x5, 0x1, 0x0, 0x4, 0x80000000, 0x8}, {0x0, 0x80000000, 0x9a4, 0x2, 0x4, 0xffff}], [{0x5}, {0x2}, {0x5, 0x1}, {0x2, 0x1}, {}, {0x8a9407dda42254af}, {0x5, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x511f94e19b18951}, {0x3}, {0x1}, {0x1}, {0x5}, {0x1, 0x1}, {0x5}, {0x3}, {0x4}, {0x1}, {0xbf37b4df630b7d16, 0x1}, {0x97c3a80d3b6022e5, 0x3}, {0xc}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {}, {0x4}, {0x2}, {0x2}, {0x1}, {0x5, 0x1}, {0x1}, {0x2, 0x3}, {0x7}, {0x1, 0x1}, {0x6}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x2}, {0x3}, {0x3}, {0x2}, {0x2, 0x1}, {}, {0x5, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {}, {}, {0x2, 0x1}, {0x3, 0x1}, {0xb, 0x1}, {0x8}, {0x2, 0x8b96cc837372e047}, {0x0, 0x1}, {0x1, 0x1}, {0x2}, {0x5}, {}, {0x2}, {0x1, 0x3}, {0x2, 0xf008b18a501724b7}, {0x1, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5}, {0x0, 0x1}, {}, {0x6}, {0x0, 0x3}, {0x2}, {0x1, 0x1}, {0x1, 0x1}, {0x1}, {0x0, 0x1}, {0x5, 0x1}, {}, {0xf2f7b307062da95b, 0x4026c56c80f427a2}, {0x0, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x0, 0x129906e051001d92}, {0x3, 0x1}, {0x4, 0x1}, {}, {0x2}, {0x3, 0x2}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0xc2ee6e13a4ed9011, 0x1}, {}, {0x4, 0x1}, {0x1}, {0x1}, {0x1}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x2}, {0x4, 0x1}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x1, 0x1}, {0x86dac63b04049f20, 0x1}, {0x0, 0x1}, {0x4}, {0x3}, {0x3}, {0x2, 0x647af2728b4080dc}, {}, {0xe6646899a46d70bc, 0x1}, {0x5}, {0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x1}, {0x3}, {0x2, 0x1}, {0x4, 0x1}, {0xb}, {0x1}, {0x2, 0x1}]}}]}, {0xb4, 0x6, "3e0afefcd40effc1198174af73508ed72a905d8b89d2d3587bbc90ce862daf771a45d12d86c306127bf7a583263ef64576e7a43d13e14a282bf4e4c758a00a9efa164cabdca753da0c841b1fea4db26c57d85ff1d3fe8511b69c953ce07fe8edb94cfded18843325f18c1391dcef3146e5e0ed48cf234a73296813b242b7d678564f888c6e34d781b2361778d9b99b609793a8f9c0f70c011b6114736b0cb2f860bdfff470c060a83952304e6d"}}}}]}, 0x67ec}, 0x1, 0x0, 0x0, 0x24080000}, 0x1) setsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0xf}, @remote}, 0x8) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x53) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80000000400200) ioctl$KDSKBLED(r1, 0x4b65, 0x80) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r5 = socket$unix(0x1, 0x400040000000001, 0x0) r6 = dup3(0xffffffffffffffff, r5, 0x0) ioctl$KDDELIO(r6, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) r7 = fcntl$dupfd(r6, 0x0, r4) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000100)=@req={0xffffffff, 0x800, 0x3f, 0x20}, 0x10) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000000)=@req3={0x3f, 0x6, 0x8000, 0x6, 0x0, 0x400}, 0x1c) 06:44:36 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:37 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a", 0x6b}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x68881, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00'], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) r2 = socket(0xa, 0x2e2cd8ff04d28757, 0x5) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) 06:44:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000100)={0x8, 0x4, 0x1, 0x4, 0x3, [{0x8, 0x100000001, 0x3d, 0x0, 0x0, 0x3806}, {0x80000001, 0x9, 0x2, 0x0, 0x0, 0x400}, {0x8, 0x0, 0xde, 0x0, 0x0, 0x2100}]}) 06:44:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586", 0x71}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:37 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r4, 0x1b, r5, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$PPPIOCSMRU1(r5, 0x40047452, &(0x7f0000000040)=0xffffff00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) r6 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r6, 0x0) bind$unix(r6, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = socket$unix(0x1, 0x400040000000001, 0x0) r8 = dup3(0xffffffffffffffff, r7, 0x0) ioctl$KDDELIO(r8, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r8, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) ioctl$PPPIOCSCOMPRESS(r8, 0x4010744d) listen(r6, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000100)={'bpq0\x00', {0x2, 0x4e21, @loopback}}) 06:44:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) fcntl$setsig(r3, 0xa, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x400040000000001, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$KDDELIO(r5, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r5, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) recvmsg(r5, &(0x7f0000000400)={&(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/209, 0xd1}], 0x1, &(0x7f0000000300)=""/244, 0xf4}, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockname$packet(r7, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000540)=0xe8) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$packet(r9, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$BINDER_SET_CONTEXT_MGR(r9, 0x40046207, 0x0) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) sendto(r10, &(0x7f0000000040)="720e5ad0ba6c35958bdadb33754fbc451143f795f52257a23f", 0x19, 0x4000000, &(0x7f0000000580)=@ipx={0x4, 0x23f, 0x0, "d14c7bd4dc56", 0x2}, 0x80) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b", 0x4d}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:37 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:37 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a", 0x6b}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x400040000000001, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000140)={0x55, 0x5, 0x6, {0xfff8, 0x1}, {0x7, 0x8001}, @rumble={0x5, 0x7}}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getresgid(&(0x7f0000000180), &(0x7f0000000040), &(0x7f0000000100)) setsockopt$packet_int(r2, 0x107, 0x10, &(0x7f0000000000)=0x7ff, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x1, 0x4}, 0x1c) 06:44:38 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586", 0x71}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:38 executing program 5: r0 = gettid() getpriority(0x1, r0) getpgrp(0xffffffffffffffff) r1 = gettid() getpriority(0x1, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r4, 0x1b, r5, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r5, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) perf_event_open(0x0, r1, 0x2, r6, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockname$packet(r10, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r12 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640008001126ea00ffffffff490018000000000095000000000000008a07d657c11e17641d3cb6a94c31d095b8b6927fbdd0c504faffcbc378766e2f2cacb4ec615ae1b26022a0f5b10bb13dd4b2847ad7e7ad6322fc0841dc259db12f3a652528da72c63327d461bf151450c24cd0737f764193455ffbae03c3e6848943278c842908ecc721c158cdc890b0ecd55ce573437af006b5e0863930d718f302527cbb86f3e94f92e3241f9ca5eed97d26bf4f7b67205e40135cce54f74fffc3a5"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r11, 0x1b, r12, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r12, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400203) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xfe16) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r2, 0x0, 0x0, 0x110003) lseek(r2, 0x0, 0x3) r3 = syz_genetlink_get_family_id$team(0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x40, 0x1c4) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r5}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r5}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@local, @loopback, r5}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r6, 0x0, 0xdd) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r7}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r7}, 0x14) setsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @multicast2, r7}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r10, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x17100010}, 0xc, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES16=r3, @ANYRES64=r12, @ANYRES32=r1, @ANYBLOB="9000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ff7f0102020000000500000700000000abed021f0000000008000100", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r8, @ANYRES64=r9, @ANYRESHEX=0x0], @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r5, @ANYBLOB="b800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005b4800003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="000102004000017bc20001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462716c010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002bdb00", @ANYRES32=r1, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040080000202008000000600070601"], 0xf}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockname$packet(r14, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r16 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r15, 0x1b, r16, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = fcntl$dupfd(r17, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getsockname$packet(r18, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r20 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r19, 0x1b, r20, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) r22 = fcntl$dupfd(r21, 0x0, r21) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) getsockname$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r24 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r23, 0x1b, r24, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) r26 = fcntl$dupfd(r25, 0x0, r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) getsockname$packet(r26, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r28 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r27, 0x1b, r28, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r29 = socket$inet6_tcp(0xa, 0x1, 0x0) r30 = fcntl$dupfd(r29, 0x0, r29) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) getsockname$packet(r30, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r32 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000001980)=ANY=[@ANYBLOB="000000000000040000000000ff0febeb137ab2b42742529c5d1b000085800300640000000126ea00ffffffff35001800000004009500000000000000f59e997f84"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r31, 0x1b, r32, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r33 = socket$inet6_tcp(0xa, 0x1, 0x0) r34 = fcntl$dupfd(r33, 0x0, r33) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) getsockname$packet(r34, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r36 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r35, 0x1b, r36, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'vxcan1\x00', 0x0}) accept4$packet(r0, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000018c0)=0x14, 0x80000) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) r41 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r41, 0x0) bind$unix(r41, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r41, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r41, 0x8933, &(0x7f0000001bc0)={'vxcan0\x00', 0x0}) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) r44 = fcntl$dupfd(r43, 0x0, r43) ioctl$PERF_EVENT_IOC_ENABLE(r44, 0x8912, 0x400200) getsockname$packet(r44, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r46 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r45, 0x1b, r46, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r47 = socket$inet6_tcp(0xa, 0x1, 0x0) r48 = fcntl$dupfd(r47, 0x0, r47) ioctl$PERF_EVENT_IOC_ENABLE(r48, 0x8912, 0x400200) getsockname$packet(r48, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r50 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r49, 0x1b, r50, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000002200)={&(0x7f0000001c00)={0x5ec, r3, 0xfa40b55310ead0a3, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r15}, {0x58, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x222, 0x1f, 0x5}, {0x272, 0x1, 0x6, 0x401}, {0x9, 0x5, 0x4, 0x7}, {0x401, 0x98, 0x7, 0x8}]}}}]}}, {{0x8, 0x1, r19}, {0xfc, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x666}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r27}, {0x164, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r35}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ebc}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r37}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10}}}]}}, {{0x8}, {0x1a8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r38}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xf7dc}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r39}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xbfb2d50f}}, {0x8, 0x6, r40}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r42}}}]}}, {{0x8, 0x1, r45}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffff859}}}]}}, {{0x8, 0x1, r49}, {0x10c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2a}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5ec}, 0x1, 0x0, 0x0, 0x40}, 0x4004801) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r51, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:38 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:38 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r7 = timerfd_create(0x3, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockname$packet(r9, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r11 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000f000085800001640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r10, 0x1b, r11, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r11, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r12 = dup3(r11, r0, 0xc0000) r13 = eventfd2(0x988, 0x40000) r14 = openat$full(0xffffffffffffff9c, &(0x7f0000001580)='/dev/full\x00', 0x14080, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) getsockname$packet(r16, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r18 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r17, 0x1b, r18, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) bind$packet(r18, &(0x7f00000002c0)={0x11, 0x1b, 0x0, 0x1, 0xef}, 0x14) r19 = openat(r18, &(0x7f0000001640)='./file0\x00', 0x8000, 0x0) io_submit(r3, 0x7, &(0x7f00000016c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x2, r4, &(0x7f0000000100)="6dea14e7868d2bab3a9ad063b58f90429a84cca7998bda1d2b419768426c0cb111134516976844b1ddd8f4ba12c753dab00b26a74cfed7b8898af6c84060cfefea7fa6bfe09ac20589f5a0f3508a6ad353b4371cf160fb2aef8485a11d24a5b7319fa6a8e9fddd7b90eca746562c2a57f8e5343ba5dd71dc4bacbef102a17204be440db2f191583407b6fff1aa2bf4153566b7f65469de0bf1f93eede8c1be9ff96cb858c2b565170874976c46b3b278c14ca130", 0xb4, 0x7, 0x0, 0x2}, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x5, 0x4, 0xffffffffffffffff, &(0x7f0000000200)="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", 0x1000, 0xff, 0x0, 0x2, r6}, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x1, 0x7a, r7, &(0x7f0000001240)="c103d4e0242ede0e3630621b3df3c3bc148790f6d2b76a2a", 0x18, 0x80000000}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x6, 0x0, r2, &(0x7f00000012c0)="5597c7675d730b341493a1f2b052df512f2588d598212380c637a82864fdb722472fd071d4a9f6c3b1b0ed31b1632dc7642959cb31b050df15660bcc6ac61bbe34f1f59418427ad1b5ec", 0x4a, 0x8, 0x0, 0x0, r12}, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x7f, r2, &(0x7f0000001380)="0b8ff91f307c26753ba1510c9fecf490e210d4314644e3fabe4bb5dbb81c7b02ab2bb126ca2376d81ddd4c01946d4e9d3a765f0677cdbd10c5a06994a19c67de112709e5a8376fa153dd6e57080be4c0c18d7f4e0935b7c8a12367b29223c80e9f3f1f4609b0139c94d966b6f2a49319089471e88b3f22c3c184fe0a3c14ae9bb5ce198e6ef950febe", 0x89, 0x7fffffff, 0x0, 0x0, r13}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f0000001480)="8692f38ec0635cb3a9f4dcc30c9989ac194d58397674f8dc58177747fa563a4588fcb9b69ac85a5a50cc8822370e26828895c8138a310de7059fa13f0dff8a4ac08fd002ca52b8cb156889d5843d14db13ef3cd954b86201b7f3124dc8ae48583fb7f8a1b5fd6e0bb8a180c36bd12e6461581393dd39dc015790834571c1e5e5da398ea8a9bbec67934c51ca8c82ae889e97d67324bffff34b0fd32dff2d828f5f13f9ba1ab4c74312597e5f73db0ffe25fac52607e305314317309cc41a8b638edc1ff2dcc1ca045f1a1165944fac3d4a6b6b2a5fc654a4121ae746be2a643db8f5ea7ec0d8bbe0389beb2e5322", 0xee, 0x3f, 0x0, 0x3, r14}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x5, 0x8, r2, &(0x7f0000001600)="5984574826a1c19de32232098f8a48b5c48a84f057a26294edd2e9cca7773b6dc5023d047c64d902b39312000c0db9aac8b9fdfd135fdbb38cae", 0x3a, 0x401, 0x0, 0x2, r19}]) r20 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:38 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a", 0x6b}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:39 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586", 0x71}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:39 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000040)='syz1\x00'}, 0x30) r1 = perf_event_open(0x0, r0, 0x7, 0xffffffffffffffff, 0x1) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000780)={0x1, &(0x7f00000001c0)=[{0x0, 0x80, 0x3, 0xe66}]}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="2800000010000108000000000000000000000000f173324e4ee39d7086c711d829412958ec711dc121b26b55653b05003aae4fa7de4f638c031197bd86ca49ebcbb1f18700b37725f1055d6b3a338dacea7c3cc30dc1eb7c1e339da222886893343c0f6eb40b8cf1b375c7684ae56e8d6e8fe50ca4d05cbbedf40690f7b0399d34f3b87dca7b8891fe6b8dc8534dfee07e1ef21525aaf8f10661d11fa0af5aa49d992a1fb2e5b23e", @ANYRES32=0x0, @ANYBLOB="000004000000000008001b0000000000"], 0x28}}, 0x0) fallocate(r4, 0x22, 0x6, 0xe95) r5 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$unix(0x1, 0x400040000000001, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="104adf837f010006002e2f66696c6530"], 0x10) ioctl$VT_GETMODE(r5, 0x5601, &(0x7f00000007c0)) ioctl$KDDELIO(r7, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r7, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) write$uinput_user_dev(r7, &(0x7f0000000300)={'syz1\x00', {0x0, 0x4, 0x57be, 0x8}, 0x8, [0x400, 0x3, 0xb28, 0x7, 0x20, 0x0, 0x6, 0x1f, 0x1000, 0x1, 0x7, 0x5, 0x1f, 0x1, 0x9, 0x6, 0x9, 0x7, 0xff, 0x8000, 0xfff, 0x3f, 0x2, 0xffffffff, 0x3ff, 0xd5, 0x1, 0xfffffffb, 0x400, 0x4, 0x5, 0x10000, 0xd34d, 0xe9fe, 0x3, 0xb75b, 0x9, 0x6, 0x82ef, 0x5c7, 0x2, 0x9, 0xfffffbff, 0x1, 0x20, 0x7, 0x0, 0xff, 0x83, 0x600, 0x6, 0xfff, 0x37ce, 0xfffffffd, 0x0, 0x800, 0x7, 0x4, 0xf7, 0x2, 0x4, 0x2, 0x0, 0xfffffffd], [0x4, 0x3, 0x7ff, 0x80, 0x401, 0x1, 0x5, 0x2, 0x3, 0x7fffffff, 0x6, 0x7, 0xff, 0x5, 0xffffffff, 0x4, 0x10000, 0x6, 0xe6, 0x2, 0xff, 0x3, 0xfffffffe, 0x2, 0x5, 0x101, 0xffffff0b, 0x4, 0x79f, 0x4, 0x7e42, 0x1, 0x425, 0x7fffffff, 0x8, 0xf0e, 0x8001, 0x8, 0xfffffffc, 0x5, 0x400, 0x5, 0x20, 0x1, 0x1, 0x20, 0x7fffffff, 0x7, 0x4000, 0x72, 0x6, 0x5, 0x5, 0x1208, 0x8, 0x2, 0x3, 0x0, 0x7, 0x9, 0x12, 0x80000001, 0x10001, 0x3f], [0x1ff, 0xffff, 0x3ff, 0x3, 0x7, 0xffffff80, 0x5, 0x7fffffff, 0x280, 0x200, 0x1, 0x8, 0x7, 0x4, 0x2, 0xa3ce, 0x40, 0x8aa4, 0x7ff, 0x2, 0x1f, 0x73, 0x9, 0x2, 0x8, 0x2, 0x9, 0x9, 0x9062, 0xfffffffb, 0x9, 0x7, 0x2, 0x0, 0x4, 0x81, 0x548da0a, 0x1, 0x1ff, 0x3, 0x1, 0x0, 0x1, 0x7fffffff, 0x8, 0x0, 0x6, 0x10000, 0x7, 0x5, 0x8, 0x7, 0x3ff, 0x3, 0x1ff, 0x5, 0x9, 0x1, 0x7, 0x49e5, 0xac, 0xfffffffe, 0x1, 0x800007], [0x8, 0x4b7da8c3, 0x5, 0x3f, 0x8000, 0x5, 0x8, 0x0, 0x7, 0xfffffffd, 0x7, 0x400, 0xffffffb1, 0x5, 0x20, 0x0, 0x7, 0x8, 0x0, 0x4, 0x8000, 0x5, 0x8, 0x20, 0x6, 0x2, 0x8, 0x7fffffff, 0x330, 0x0, 0x8, 0x2, 0x6, 0x8, 0x1, 0x9, 0x8a, 0x0, 0x9, 0x100, 0x10001, 0x2a, 0x2, 0x80000001, 0x5, 0x3f, 0x8000, 0x10, 0x5, 0x6, 0x2, 0xbe7, 0x1000, 0x8, 0x7f, 0x7, 0x3b8a51d7, 0x4, 0x400, 0x3, 0x8000, 0x7fff, 0x3, 0x3]}, 0x45c) keyctl$join(0x1, &(0x7f0000000180)={'syz', 0x3}) 06:44:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) umount2(&(0x7f0000000180)='./file0\x00', 0x2) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) fsetxattr(r1, &(0x7f0000000040)=@random={'security.', '\x00'}, &(0x7f0000000100)='+mime_typevmnet0-}-\x00', 0x14, 0x1) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) [ 382.866061] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 06:44:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) rmdir(0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) connect(r4, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000200)={0x2, 0x1004e20, @rand_addr=0xfffffffc}, 0x10) setsockopt$SO_TIMESTAMP(r5, 0x1, 0x0, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r5, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000003c80), 0x38e, 0x62, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='status\x00') preadv(r6, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) 06:44:39 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffd96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r2, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'hsr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, 'hsr0\x00'}], 0xa, "84703d68d446653afd0abdc398c790d18f40f06b774a314f8f87af80062c69dd013f32528d2528ce08108ea0a7e87750ac901fbdc6e8616c51b1481cc1cbc9d4a498a14b3097c48f03099b3a7bba37b93e69fac79d1d6df383ab25ed315d4ca99ebfe093e255af6b7d7c9d2453cf84a19d6c955231aeb3b550ca7adc96aa0e57bf5cd6302f8f4551db11e325e1d051367f69080555cc96c583fa7b60c17f8c2018eee4940d93a50a07f4b688c56b0ea582866229ca7439813d8048d0837a2f81a3a94193"}, 0xd5) 06:44:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) [ 383.366640] WARNING: stack going in the wrong direction? ip=do_nanosleep+0x19b/0x640 06:44:39 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f1", 0xa1}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:40 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c333", 0x73}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:40 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c00000015000100000000000000000027000000", @ANYRES32=r1, @ANYBLOB="f28e0000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7fffffff, 0x0) 06:44:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000040)={0x3ff, 0x9, 0x401}) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:40 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:40 executing program 5: perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x2, 0x6, 0x8000, 0x6}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) 06:44:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:40 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f1", 0xa1}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c333", 0x73}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) prctl$PR_GET_KEEPCAPS(0x7) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) 06:44:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/sctp\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffff, 0x8}, 0x10008, 0x0, 0x0, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000540)={'veth1\x00', 0x10001}) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) sendmsg$nl_route(r3, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@getstats={0x1c, 0x5e, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, 0x1}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40c0}, 0x40000) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x80000001, 0x8000}]}, 0xc, 0x3) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="802de6ac16f160f59c5dfeef039166b7b0d562f467afb16d365fd90f30f3723d5c66fce744abc6194c1b18128cf7a7f9372c6fb2fc2f440b6d6bcec955715e989138585e350122a0486515d447f7b4b2cfbf26a946f8936359ede298c08e78191e3f69bd8cbf5cbc5d93950479a36fefbc6b2bbc4eda97a80ded091aa36677671438815e581df27fd48f4aa751c2a32290230abaad13863cfbe6b5b93b0278dccd78e19eae", 0xa5, 0xffffffffffffffff) 06:44:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x100, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:41 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:41 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x400040000000001, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x2) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000300)}) getpeername$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:41 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f1", 0xa1}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:41 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c333", 0x73}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:42 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:42 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:42 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x7fff, 0x76d, 0x9) 06:44:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:42 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d", 0xbc}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:42 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:43 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c333", 0x73}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000100)=""/130) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:43 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d", 0xbc}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c000000150001000000000000000000", @ANYRES32, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xfe16) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r2, 0x0, 0x0, 0x110003) lseek(r2, 0x0, 0x3) r3 = syz_genetlink_get_family_id$team(0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x40, 0x1c4) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r5}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r5}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@local, @loopback, r5}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r6, 0x0, 0xdd) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r7}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r7}, 0x14) setsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @multicast2, r7}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r10, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x17100010}, 0xc, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES16=r3, @ANYRES64=r12, @ANYRES32=r1, @ANYBLOB="9000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ff7f0102020000000500000700000000abed021f0000000008000100", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r8, @ANYRES64=r9, @ANYRESHEX=0x0], @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r5, @ANYBLOB="b800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005b4800003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="000102004000017bc20001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462716c010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002bdb00", @ANYRES32=r1, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040080000202008000000600070601"], 0xf}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockname$packet(r14, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r16 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r15, 0x1b, r16, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = fcntl$dupfd(r17, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getsockname$packet(r18, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r20 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r19, 0x1b, r20, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) r22 = fcntl$dupfd(r21, 0x0, r21) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) getsockname$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r24 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r23, 0x1b, r24, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) r26 = fcntl$dupfd(r25, 0x0, r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) getsockname$packet(r26, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r28 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r27, 0x1b, r28, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r29 = socket$inet6_tcp(0xa, 0x1, 0x0) r30 = fcntl$dupfd(r29, 0x0, r29) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) getsockname$packet(r30, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r32 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000001980)=ANY=[@ANYBLOB="000000000000040000000000ff0febeb137ab2b42742529c5d1b000085800300640000000126ea00ffffffff35001800000004009500000000000000f59e997f84"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r31, 0x1b, r32, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r33 = socket$inet6_tcp(0xa, 0x1, 0x0) r34 = fcntl$dupfd(r33, 0x0, r33) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) getsockname$packet(r34, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r36 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r35, 0x1b, r36, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'vxcan1\x00', 0x0}) accept4$packet(r0, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000018c0)=0x14, 0x80000) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) r41 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r41, 0x0) bind$unix(r41, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r41, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r41, 0x8933, &(0x7f0000001bc0)={'vxcan0\x00', 0x0}) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) r44 = fcntl$dupfd(r43, 0x0, r43) ioctl$PERF_EVENT_IOC_ENABLE(r44, 0x8912, 0x400200) getsockname$packet(r44, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r46 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r45, 0x1b, r46, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r47 = socket$inet6_tcp(0xa, 0x1, 0x0) r48 = fcntl$dupfd(r47, 0x0, r47) ioctl$PERF_EVENT_IOC_ENABLE(r48, 0x8912, 0x400200) getsockname$packet(r48, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r50 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r49, 0x1b, r50, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000002200)={&(0x7f0000001c00)={0x5ec, r3, 0xfa40b55310ead0a3, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r15}, {0x58, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x222, 0x1f, 0x5}, {0x272, 0x1, 0x6, 0x401}, {0x9, 0x5, 0x4, 0x7}, {0x401, 0x98, 0x7, 0x8}]}}}]}}, {{0x8, 0x1, r19}, {0xfc, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x666}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r27}, {0x164, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r35}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ebc}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r37}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10}}}]}}, {{0x8}, {0x1a8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r38}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xf7dc}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r39}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xbfb2d50f}}, {0x8, 0x6, r40}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r42}}}]}}, {{0x8, 0x1, r45}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffff859}}}]}}, {{0x8, 0x1, r49}, {0x10c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2a}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5ec}, 0x1, 0x0, 0x0, 0x40}, 0x4004801) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r51, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:44 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)={0x9, 0x1ff}) ioperm(0x2, 0x76d, 0x77e3) 06:44:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, 0x0) setresuid(0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 06:44:44 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a0000", @ANYRES32=r4, @ANYBLOB], 0x3}}, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d", 0xbc}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f", 0x8b}, {0x0}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) fcntl$dupfd(r5, 0x0, r6) 06:44:44 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00", @ANYRES32=r3, @ANYBLOB="14000100fe8000000000000000003d70dc1b3f0000000000bb"], 0x3}}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:44 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xfe16) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r2, 0x0, 0x0, 0x110003) lseek(r2, 0x0, 0x3) r3 = syz_genetlink_get_family_id$team(0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x40, 0x1c4) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r5}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r5}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@local, @loopback, r5}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r6, 0x0, 0xdd) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r7}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r7}, 0x14) setsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @multicast2, r7}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r10, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x17100010}, 0xc, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES16=r3, @ANYRES64=r12, @ANYRES32=r1, @ANYBLOB="9000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ff7f0102020000000500000700000000abed021f0000000008000100", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r8, @ANYRES64=r9, @ANYRESHEX=0x0], @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r5, @ANYBLOB="b800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005b4800003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="000102004000017bc20001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462716c010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002bdb00", @ANYRES32=r1, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040080000202008000000600070601"], 0xf}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockname$packet(r14, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r16 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r15, 0x1b, r16, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = fcntl$dupfd(r17, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getsockname$packet(r18, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r20 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r19, 0x1b, r20, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) r22 = fcntl$dupfd(r21, 0x0, r21) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) getsockname$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r24 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r23, 0x1b, r24, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) r26 = fcntl$dupfd(r25, 0x0, r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) getsockname$packet(r26, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r28 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r27, 0x1b, r28, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r29 = socket$inet6_tcp(0xa, 0x1, 0x0) r30 = fcntl$dupfd(r29, 0x0, r29) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) getsockname$packet(r30, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r32 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000001980)=ANY=[@ANYBLOB="000000000000040000000000ff0febeb137ab2b42742529c5d1b000085800300640000000126ea00ffffffff35001800000004009500000000000000f59e997f84"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r31, 0x1b, r32, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r33 = socket$inet6_tcp(0xa, 0x1, 0x0) r34 = fcntl$dupfd(r33, 0x0, r33) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) getsockname$packet(r34, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r36 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r35, 0x1b, r36, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'vxcan1\x00', 0x0}) accept4$packet(r0, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000018c0)=0x14, 0x80000) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) r41 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r41, 0x0) bind$unix(r41, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r41, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r41, 0x8933, &(0x7f0000001bc0)={'vxcan0\x00', 0x0}) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) r44 = fcntl$dupfd(r43, 0x0, r43) ioctl$PERF_EVENT_IOC_ENABLE(r44, 0x8912, 0x400200) getsockname$packet(r44, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r46 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r45, 0x1b, r46, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r47 = socket$inet6_tcp(0xa, 0x1, 0x0) r48 = fcntl$dupfd(r47, 0x0, r47) ioctl$PERF_EVENT_IOC_ENABLE(r48, 0x8912, 0x400200) getsockname$packet(r48, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r50 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r49, 0x1b, r50, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000002200)={&(0x7f0000001c00)={0x5ec, r3, 0xfa40b55310ead0a3, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r15}, {0x58, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x222, 0x1f, 0x5}, {0x272, 0x1, 0x6, 0x401}, {0x9, 0x5, 0x4, 0x7}, {0x401, 0x98, 0x7, 0x8}]}}}]}}, {{0x8, 0x1, r19}, {0xfc, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x666}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r27}, {0x164, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r35}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ebc}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r37}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10}}}]}}, {{0x8}, {0x1a8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r38}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xf7dc}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r39}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xbfb2d50f}}, {0x8, 0x6, r40}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r42}}}]}}, {{0x8, 0x1, r45}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffff859}}}]}}, {{0x8, 0x1, r49}, {0x10c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2a}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5ec}, 0x1, 0x0, 0x0, 0x40}, 0x4004801) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000001800)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a000000", @ANYRES32=r51, @ANYBLOB="14000100fe8000000000000000"], 0x3}}, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000780)=""/4096, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) ioperm(0x2, 0x76d, 0x77e3) 06:44:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@loopback}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) preadv(r0, &(0x7f00000017c0), 0x351, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000780)=""/4096, &(0x7f0000000240)=0x1000) writev(r1, &(0x7f0000001780)=[{&(0x7f0000000300)="3c3c3675beea87dad4fcf26a1ba79d17505361ff69c76464fe168569683927570d4cd09a62775b8f0284853b3dcb8f7e2b8bae2c08028b2469d5ef35113595c37ad2c347eaecf2347bfdd5f89fafe8fba4e980bdae3174ef43abdae42732ee22a712555b13a05c87150d6a0c22bb0ad3e7cb9a07d01d05e552bb420736255c5df0f2f5a3975b2d945718116b59351962d1cc304836377258626ca6bc2160bcb4f180c45f10e65095ebfd622b0d30c3d9abcaaed4db5641e8521d3b9d89de9ccf288e4553160d579c9c37e2299d5575d1e1d2b3c01463", 0xd6}, {&(0x7f0000000400)="852dbda90f8c576bd654e7425693e6fd767525676b0fd31b4da533c371fb955d630d9dbcb9a31d638edfb4072695aa44a1ead783c817da23383fe1ebfd4b47f0e7d0ba60fa97c005e0b6c74ae3fa11f677bec9092ae34c2863fcff0a7d0a3d778a68282f865f6e32a6f909567c577887a6b9c50f0338686027a75344eae1b2c8d66a4c2acaf2695af6ac504d9051b49d43d8d6d03510264827842fcf1b6c248fc679bebc8a3e0405e64dfbe226a4536c51da947e0a9343b72cd7357ccb3abbe0efe5edb5a30aed02444d77c61c775ece5b24fbaf33f594b750bca53c0a", 0xdd}, {&(0x7f00000005c0)="1331e8baed7ebb292ca2b9a4689883973a0c5ebe5c996025146ce4bb2b7fc35fa5ee67e13381a7594e760343d0335c1af1f9a5288aea0c5e3afd8079fd2b332a1d34d879b24eab04361d49d40b9961aff39d5093f86f1bdd35f56c5ba4524b136025f511c56600afa76e0c105784faed564b0c645e673e8ac7dc6e3f567265a61ac222755afeb03ac9a41f3ef0c1dc", 0x8f}, {&(0x7f0000000500)="2abe6bce8d65522644bae122f7e15005c855", 0x12}, {&(0x7f0000000680)="a4979c653ecbc4b5aeba4185f4c8e243bdbbf61517b2f44fca23ad400ff88d1d7319c2e7a72bab6fa81401b7894b096a90b41256fe6e4b0d285c86ecca13ce0e157b74c1226fffb5b8b6e7849d9e9eaed78201fba93b0bba09a9404c2e9d569ca70daccf4599920c1cfa1f54a3c5c06586c33372", 0x74}, {&(0x7f0000000700)="eb3eda4143841bba8a521bb8033fe8bfd7dc7011479dfb9653738a97ac3bb52895c9c1ae1a05e43fdc8d239a0d66c99216308d4941093d8cfa76b20bf99f15f4ec7eea91272e2fc897a923880b7a", 0x4e}], 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioperm(0x2, 0x76d, 0x77e3) 06:44:45 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fstat(0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xfe16) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r2, 0x0, 0x0, 0x110003) lseek(r2, 0x0, 0x3) r3 = syz_genetlink_get_family_id$team(0x0) r4 = open(&(0x7f0000000400)='./bus\x00', 0x40, 0x1c4) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r5}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r5}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@local, @loopback, r5}, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r6, 0x0, 0xdd) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r7}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000080)={@mcast2, r7}, 0x14) setsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000040)={@multicast2, @multicast2, r7}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup2(r10, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x17100010}, 0xc, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES16=r3, @ANYRES64=r12, @ANYRES32=r1, @ANYBLOB="9000020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ff7f0102020000000500000700000000abed021f0000000008000100", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r8, @ANYRES64=r9, @ANYRESHEX=0x0], @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r5, @ANYBLOB="b800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040004000000080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005b4800003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="000102004000017bc20001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462716c010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004002bdb00", @ANYRES32=r1, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040080000202008000000600070601"], 0xf}, 0x1, 0x0, 0x0, 0x40}, 0x8000) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockname$packet(r14, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r16 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r15, 0x1b, r16, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = fcntl$dupfd(r17, 0x0, r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getsockname$packet(r18, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r20 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r19, 0x1b, r20, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) r22 = fcntl$dupfd(r21, 0x0, r21) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) getsockname$packet(r22, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r24 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r23, 0x1b, r24, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r25 = socket$inet6_tcp(0xa, 0x1, 0x0) r26 = fcntl$dupfd(r25, 0x0, r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) getsockname$packet(r26, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r28 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r27, 0x1b, r28, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r29 = socket$inet6_tcp(0xa, 0x1, 0x0) r30 = fcntl$dupfd(r29, 0x0, r29) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) getsockname$packet(r30, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r32 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000001980)=ANY=[@ANYBLOB="000000000000040000000000ff0febeb137ab2b42742529c5d1b000085800300640000000126ea00ffffffff35001800000004009500000000000000f59e997f84"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r31, 0x1b, r32, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r33 = socket$inet6_tcp(0xa, 0x1, 0x0) r34 = fcntl$dupfd(r33, 0x0, r33) ioctl$PERF_EVENT_IOC_ENABLE(r34, 0x8912, 0x400200) getsockname$packet(r34, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r36 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r35, 0x1b, r36, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'vxcan1\x00', 0x0}) accept4$packet(r0, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000018c0)=0x14, 0x80000) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) r41 = socket$unix(0x1, 0x400040000000001, 0x0) dup3(0xffffffffffffffff, r41, 0x0) bind$unix(r41, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r41, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r41, 0x8933, &(0x7f0000001bc0)={'vxcan0\x00', 0x0}) r43 = socket$inet6_tcp(0xa, 0x1, 0x0) r44 = fcntl$dupfd(r43, 0x0, r43) ioctl$PERF_EVENT_IOC_ENABLE(r44, 0x8912, 0x400200) getsockname$packet(r44, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r46 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r45, 0x1b, r46, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) r47 = socket$inet6_tcp(0xa, 0x1, 0x0) r48 = fcntl$dupfd(r47, 0x0, r47) ioctl$PERF_EVENT_IOC_ENABLE(r48, 0x8912, 0x400200) getsockname$packet(r48, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) r50 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x490202, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000000000000ff0f000085800000640000001126ea00ffffffff35001800000000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x71, &(0x7f0000000240)=""/113, 0x41000, 0x1, [], r49, 0x1b, r50, 0x8, &(0x7f0000000500)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x8, 0x6, 0x1f}, 0x10}, 0x70) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000002200)={&(0x7f0000001c00)={0x5ec, r3, 0xfa40b55310ead0a3, 0x70bd2d, 0x25dfdbff, {}, [{{0x8, 0x1, r15}, {0x58, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x222, 0x1f, 0x5}, {0x272, 0x1, 0x6, 0x401}, {0x9, 0x5, 0x4, 0x7}, {0x401, 0x98, 0x7, 0x8}]}}}]}}, {{0x8, 0x1, r19}, {0xfc, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x666}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r27}, {0x164, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r35}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ebc}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r37}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10}}}]}}, {{0x8}, {0x1a8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport