_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:48 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 12:24:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:48 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:48 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585611, &(0x7f0000000040)={0x0, 0x9, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "87292cde"}, 0x0, 0x0, @fd, 0x4}) 12:24:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 957.240135][T25254] IPVS: ftp: loaded support on port[0] = 21 12:24:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x8) 12:24:48 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x8) 12:24:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:48 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) [ 957.703061][ C0] net_ratelimit: 12 callbacks suppressed [ 957.703070][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 957.715976][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 957.783118][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 957.789059][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:24:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(r5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r3, 0x0, 0x225) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:24:49 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x8) 12:24:49 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:49 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 12:24:49 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) [ 958.503021][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 958.508938][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 958.514921][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 958.520744][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:24:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x8) 12:24:49 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 12:24:49 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) [ 958.583111][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 958.589016][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 958.595629][T25522] IPVS: ftp: loaded support on port[0] = 21 [ 958.609280][T25525] IPVS: ftp: loaded support on port[0] = 21 12:24:49 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:49 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:49 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:49 executing program 4: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:49 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:49 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:50 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 12:24:50 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 12:24:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) close(r0) userfaultfd(0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 12:24:50 executing program 4: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:50 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback=0xac1e0000}}, 0x1e) 12:24:50 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 12:24:50 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 12:24:50 executing program 2: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 959.430712][T25560] IPVS: ftp: loaded support on port[0] = 21 [ 959.465660][T25593] IPVS: ftp: loaded support on port[0] = 21 12:24:50 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 12:24:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) close(r0) userfaultfd(0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 12:24:50 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 12:24:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) close(r0) userfaultfd(0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 12:24:51 executing program 0: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:51 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) 12:24:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) close(r0) userfaultfd(0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 12:24:51 executing program 4: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:51 executing program 2: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:51 executing program 1: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:51 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) [ 960.486900][T25702] IPVS: ftp: loaded support on port[0] = 21 [ 960.696520][T25713] IPVS: ftp: loaded support on port[0] = 21 12:24:51 executing program 1: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:52 executing program 0: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:52 executing program 1: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:52 executing program 4: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 12:24:52 executing program 2: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @initdev}, {0x0, @link_local}, 0xf, {0x2, 0x0, @empty}, 'ip_vti0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:24:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x4, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000840)={r0, &(0x7f0000000800)="c7"}, 0x10) 12:24:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @initdev}, {0x0, @link_local}, 0xf, {0x2, 0x0, @empty}, 'ip_vti0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:24:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x4, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000840)={r0, &(0x7f0000000800)="c7"}, 0x10) 12:24:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x0, 0x0) sync() remap_file_pages(&(0x7f0000d4f000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000800)) mremap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000c28000/0x3000)=nil) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 12:24:52 executing program 0: r0 = socket(0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x40000) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080), 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) r1 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/40, 0xffffffffffffff56, 0x2) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000280)) uname(&(0x7f0000000cc0)=""/66) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @initdev}, {0x0, @link_local}, 0xf, {0x2, 0x0, @empty}, 'ip_vti0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:24:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x4, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000840)={r0, &(0x7f0000000800)="c7"}, 0x10) 12:24:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x4, 0x4, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000840)={r0, &(0x7f0000000800)="c7"}, 0x10) 12:24:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @initdev}, {0x0, @link_local}, 0xf, {0x2, 0x0, @empty}, 'ip_vti0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 12:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 12:24:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x0, 0x0) sync() remap_file_pages(&(0x7f0000d4f000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000800)) mremap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000c28000/0x3000)=nil) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 12:24:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x0, 0x0) sync() remap_file_pages(&(0x7f0000d4f000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000800)) mremap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000c28000/0x3000)=nil) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 12:24:53 executing program 5: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000002c0)=r0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfff7, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x400000000000) 12:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 12:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 12:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 12:24:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 12:24:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x0, 0x0) sync() remap_file_pages(&(0x7f0000d4f000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000800)) mremap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000c28000/0x3000)=nil) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 12:24:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x0, 0x0) sync() remap_file_pages(&(0x7f0000d4f000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000800)) mremap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000c28000/0x3000)=nil) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 12:24:53 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f00000000c0), 0x4) [ 962.753618][ C1] net_ratelimit: 18 callbacks suppressed [ 962.753627][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 962.765169][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:24:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 12:24:53 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x40e21, @empty}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1=0xac1414bb}, @udp={0x0, 0xe21, 0x8}}}}}, 0x0) 12:24:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0xf) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:24:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x3d, &(0x7f0000b67000), &(0x7f00000000c0)=0x5d) 12:24:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e00b4ec7be070") syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x0, 0x0) sync() remap_file_pages(&(0x7f0000d4f000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000800)) mremap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000c28000/0x3000)=nil) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 12:24:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x0, 0x0) sync() remap_file_pages(&(0x7f0000d4f000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000800)) mremap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000c28000/0x3000)=nil) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 12:24:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0xf) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:24:54 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x40e21, @empty}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1=0xac1414bb}, @udp={0x0, 0xe21, 0x8}}}}}, 0x0) 12:24:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0xf) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:24:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e00b4ec7be070") syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0xf) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:24:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0xf) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:24:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @random="6f7e6256f32e", [], {@ipv6={0x86dd, {0x0, 0x6, "6d570e", 0x14, 0xff, 0x0, @empty, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:24:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e00b4ec7be070") syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7b, 0x0, [0x34]}) 12:24:54 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x40e21, @empty}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1=0xac1414bb}, @udp={0x0, 0xe21, 0x8}}}}}, 0x0) 12:24:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e38e06c5fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b53606000004000000007c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df1001000000000694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b22645cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f580968af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aebcaf4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb010100000000000001a047526865c888c9ff36056cc4ad258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0xf) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:24:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001000)={"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"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0xf) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:24:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @random="6f7e6256f32e", [], {@ipv6={0x86dd, {0x0, 0x6, "6d570e", 0x14, 0xff, 0x0, @empty, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:24:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e00b4ec7be070") syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:54 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x40e21, @empty}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1=0xac1414bb}, @udp={0x0, 0xe21, 0x8}}}}}, 0x0) 12:24:54 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @random="6f7e6256f32e", [], {@ipv6={0x86dd, {0x0, 0x6, "6d570e", 0x14, 0xff, 0x0, @empty, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:24:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000639000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend'}, {@access_any='access=any'}]}}) 12:24:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @random="6f7e6256f32e", [], {@ipv6={0x86dd, {0x0, 0x6, "6d570e", 0x14, 0xff, 0x0, @empty, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:24:54 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @random="6f7e6256f32e", [], {@ipv6={0x86dd, {0x0, 0x6, "6d570e", 0x14, 0xff, 0x0, @empty, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:24:54 executing program 1: capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000200)={0x102c, 0x7fff}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f00000000c0)=0x5, 0x4) 12:24:54 executing program 5: syz_init_net_socket$ax25(0x3, 0x2, 0xcb) 12:24:54 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xf97, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1105511, &(0x7f0000000000)=0xc) 12:24:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @random="6f7e6256f32e", [], {@ipv6={0x86dd, {0x0, 0x6, "6d570e", 0x14, 0xff, 0x0, @empty, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:24:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:55 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @random="6f7e6256f32e", [], {@ipv6={0x86dd, {0x0, 0x6, "6d570e", 0x14, 0xff, 0x0, @empty, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 963.953072][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 963.958956][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:24:55 executing program 0: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) [ 964.023597][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 964.030219][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:24:55 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x4, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) close(r0) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x8, 0x0, &(0x7f00000004c0)=[@release], 0x0, 0x0, 0x0}) 12:24:55 executing program 1: capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000200)={0x102c, 0x7fff}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f00000000c0)=0x5, 0x4) 12:24:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000639000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend'}, {@access_any='access=any'}]}}) 12:24:55 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="1b000000200007041dfffd946f6105000200000a1f000002002808", 0x1b}], 0x1}, 0x0) 12:24:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:55 executing program 1: capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000200)={0x102c, 0x7fff}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f00000000c0)=0x5, 0x4) 12:24:55 executing program 0: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:55 executing program 1: capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000200)={0x102c, 0x7fff}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f00000000c0)=0x5, 0x4) 12:24:55 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="1b000000200007041dfffd946f6105000200000a1f000002002808", 0x1b}], 0x1}, 0x0) 12:24:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) [ 964.743054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 964.748999][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 964.754972][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 964.760812][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:24:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:56 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000639000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend'}, {@access_any='access=any'}]}}) 12:24:56 executing program 0: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:56 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="1b000000200007041dfffd946f6105000200000a1f000002002808", 0x1b}], 0x1}, 0x0) 12:24:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:56 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:56 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="1b000000200007041dfffd946f6105000200000a1f000002002808", 0x1b}], 0x1}, 0x0) 12:24:56 executing program 5: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:56 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:56 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:56 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:56 executing program 0: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:57 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:57 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000639000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend'}, {@access_any='access=any'}]}}) 12:24:57 executing program 5: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:57 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:58 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:58 executing program 5: sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc0, 0x0, 0x0) 12:24:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:58 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup(r0) connect$packet(r1, 0x0, 0x0) 12:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x7fff}) 12:24:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:58 executing program 5: syslog(0x2, &(0x7f0000000000)=""/12, 0x0) 12:24:58 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WKALM_SET(r0, 0x7004, 0x0) [ 967.923445][T27100] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 32767 (only 16 groups) 12:24:59 executing program 0: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:24:59 executing program 5: syslog(0x2, &(0x7f0000000000)=""/12, 0x0) 12:24:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2446b, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid=', @ANYRESOCT]) [ 968.103126][ C0] net_ratelimit: 12 callbacks suppressed [ 968.103137][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 968.114714][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x7fff}) 12:24:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:59 executing program 5: syslog(0x2, &(0x7f0000000000)=""/12, 0x0) [ 968.183060][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 968.189312][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:24:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000651000)=""/240, &(0x7f0000000180)=0xf0) 12:24:59 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2446b, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid=', @ANYRESOCT]) 12:24:59 executing program 5: syslog(0x2, &(0x7f0000000000)=""/12, 0x0) [ 968.377057][T27151] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 32767 (only 16 groups) 12:24:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000d00)='/dev/amidi#\x00', 0x800, 0x400) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000b80), 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x2}, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r2, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40010002) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000d80)=""/92, &(0x7f0000001000)=0x5c) r4 = syz_open_dev$swradio(0x0, 0x0, 0x2) syz_open_pts(r4, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r5 = socket(0x10, 0x2, 0xc) fsetxattr$security_smack_transmute(r3, 0x0, &(0x7f0000000c80)='TRUE', 0x4, 0x2) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000c40)}, 0x4000000) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xde14}, &(0x7f0000000bc0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000e00)=ANY=[@ANYRES32], 0x0) write$vhci(r4, &(0x7f0000001040)=@HCI_SCODATA_PKT={0x3, "8b5e5c18e1eee258f818dc36fc72dbdfed617e2b0b15f6baf8f2b9ef5fcf67a82710a8d82ed57d56d839914c6f64aa62e1acbf3b0baa3337b7a40672ac7444491799308191083be0fd05c9d5d948efa53ee5e31ede43de9efccd30810f5693116e05e33c912802f6bec4a9f713d399dbb308f3a7d41d4ff527fbfe2303a1cf0d47f064319f21f72016798a5fe2ffda872dd964c87cf2a2885ea4983bc847e4884f1a12ab5283d02508c442cad5ac5308594aed16ab76d2e13bbe555c7e960b145e15695f61860367d3059d651cbfceaf4b10d5"}, 0xd4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 12:24:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000651000)=""/240, &(0x7f0000000180)=0xf0) 12:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x7fff}) [ 968.689741][T27172] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 32767 (only 16 groups) [ 968.903054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 968.908972][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 968.915002][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 968.920937][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 968.983126][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 968.989047][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:00 executing program 0: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2446b, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid=', @ANYRESOCT]) 12:25:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2446b, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid=', @ANYRESOCT]) 12:25:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000651000)=""/240, &(0x7f0000000180)=0xf0) 12:25:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000100)=[{0x0}], 0x1) 12:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x7fff}) 12:25:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000100)=[{0x0}], 0x1) 12:25:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2446b, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid=', @ANYRESOCT]) 12:25:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000651000)=""/240, &(0x7f0000000180)=0xf0) [ 969.200492][T27186] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 32767 (only 16 groups) 12:25:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2446b, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid=', @ANYRESOCT]) 12:25:00 executing program 4: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000100)=[{0x0}], 0x1) 12:25:01 executing program 0: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:01 executing program 2: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:01 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2446b, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid=', @ANYRESOCT]) 12:25:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f0000000100)=[{0x0}], 0x1) 12:25:01 executing program 3: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:01 executing program 1: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:01 executing program 5: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:01 executing program 4: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:02 executing program 1: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:02 executing program 2: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:02 executing program 5: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:02 executing program 0: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:02 executing program 3: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:03 executing program 4: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:03 executing program 2: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:03 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0, 0xfb, 0x21, 0x6, 0x4, "cb45fb742ab7794e631fca3f875a520b", "a548ada59a1e29c4d01886a1"}, 0x21, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 12:25:03 executing program 3: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:03 executing program 5: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) 12:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_buf(r1, 0x29, 0x42, &(0x7f0000000080)="0d198899", 0x4) 12:25:04 executing program 1: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49e1}}], 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000600)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) setitimer(0x0, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r1, 0x0, 0x0) [ 973.143281][ C1] net_ratelimit: 18 callbacks suppressed [ 973.143311][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 973.155744][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_buf(r1, 0x29, 0x42, &(0x7f0000000080)="0d198899", 0x4) 12:25:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r1 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0x401870cb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r2, 0x0, 0xa, &(0x7f0000000280)='net/kcm\x00\b\x00'}, 0x30) getpid() getpid() getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) creat(0x0, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='cpuset\x00') ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, 0x0) preadv(r4, &(0x7f00000017c0), 0x1a4, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0xa640, 0x0) 12:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_buf(r1, 0x29, 0x42, &(0x7f0000000080)="0d198899", 0x4) 12:25:04 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000400)) 12:25:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_buf(r1, 0x29, 0x42, &(0x7f0000000080)="0d198899", 0x4) 12:25:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r1 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0x401870cb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r2, 0x0, 0xa, &(0x7f0000000280)='net/kcm\x00\b\x00'}, 0x30) getpid() getpid() getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) creat(0x0, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='cpuset\x00') ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, 0x0) preadv(r4, &(0x7f00000017c0), 0x1a4, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0xa640, 0x0) 12:25:05 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0, 0xfb, 0x21, 0x6, 0x4, "cb45fb742ab7794e631fca3f875a520b", "a548ada59a1e29c4d01886a1"}, 0x21, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 12:25:05 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0, 0xfb, 0x21, 0x6, 0x4, "cb45fb742ab7794e631fca3f875a520b", "a548ada59a1e29c4d01886a1"}, 0x21, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 12:25:05 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)) io_setup(0x40, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_config_ext, 0x0, 0x12fa800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 12:25:05 executing program 5: r0 = mq_open(&(0x7f00000001c0)='.&\x00', 0x42, 0x0, 0x0) ftruncate(r0, 0x0) 12:25:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r1 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0x401870cb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r2, 0x0, 0xa, &(0x7f0000000280)='net/kcm\x00\b\x00'}, 0x30) getpid() getpid() getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) creat(0x0, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='cpuset\x00') ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, 0x0) preadv(r4, &(0x7f00000017c0), 0x1a4, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0xa640, 0x0) [ 974.344393][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 974.352010][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 974.423036][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 974.429136][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0xfffffffffffffce7, 0x0}}], 0x1, 0x0, 0x0) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r1 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r1, 0x401870cb) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r2, 0x0, 0xa, &(0x7f0000000280)='net/kcm\x00\b\x00'}, 0x30) getpid() getpid() getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) creat(0x0, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) r4 = syz_open_procfs(r3, &(0x7f00000000c0)='cpuset\x00') ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, 0x0) preadv(r4, &(0x7f00000017c0), 0x1a4, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0xa640, 0x0) 12:25:05 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0, 0xfb, 0x21, 0x6, 0x4, "cb45fb742ab7794e631fca3f875a520b", "a548ada59a1e29c4d01886a1"}, 0x21, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 12:25:05 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)) io_setup(0x40, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_config_ext, 0x0, 0x12fa800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 12:25:05 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)) io_setup(0x40, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_config_ext, 0x0, 0x12fa800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 12:25:05 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0, 0xfb, 0x21, 0x6, 0x4, "cb45fb742ab7794e631fca3f875a520b", "a548ada59a1e29c4d01886a1"}, 0x21, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 12:25:05 executing program 5: r0 = mq_open(&(0x7f00000001c0)='.&\x00', 0x42, 0x0, 0x0) ftruncate(r0, 0x0) 12:25:05 executing program 5: r0 = mq_open(&(0x7f00000001c0)='.&\x00', 0x42, 0x0, 0x0) ftruncate(r0, 0x0) 12:25:05 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0, 0xfb, 0x21, 0x6, 0x4, "cb45fb742ab7794e631fca3f875a520b", "a548ada59a1e29c4d01886a1"}, 0x21, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 12:25:05 executing program 4: syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x40041) pwritev(r0, &(0x7f0000002600)=[{&(0x7f00000002c0)='v', 0x1}], 0x1, 0x0) 12:25:05 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)) io_setup(0x40, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_config_ext, 0x0, 0x12fa800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) [ 974.806169][T27612] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 12:25:05 executing program 5: r0 = mq_open(&(0x7f00000001c0)='.&\x00', 0x42, 0x0, 0x0) ftruncate(r0, 0x0) 12:25:05 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000200)={0x0, 0xfb, 0x21, 0x6, 0x4, "cb45fb742ab7794e631fca3f875a520b", "a548ada59a1e29c4d01886a1"}, 0x21, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) gettid() ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 12:25:05 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)) io_setup(0x40, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_config_ext, 0x0, 0x12fa800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 12:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0xfcd8, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0xff5d) recvmmsg(r2, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000dc0)=""/3, 0x3}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 12:25:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) preadv(r0, &(0x7f00000017c0), 0x1bf, 0x0) [ 974.998158][T27624] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 12:25:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') 12:25:06 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)) io_setup(0x40, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_config_ext, 0x0, 0x12fa800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 12:25:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x401}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x28}}], 0x2, 0x0) 12:25:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) preadv(r0, &(0x7f00000017c0), 0x1bf, 0x0) [ 975.143034][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 975.148978][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 975.154962][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 975.160865][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0xfcd8, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0xff5d) recvmmsg(r2, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000dc0)=""/3, 0x3}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 12:25:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x401}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x28}}], 0x2, 0x0) 12:25:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) preadv(r0, &(0x7f00000017c0), 0x1bf, 0x0) 12:25:06 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)) io_setup(0x40, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(0xffffffffffffffff, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil}) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_config_ext, 0x0, 0x12fa800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 12:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0xfcd8, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0xff5d) recvmmsg(r2, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000dc0)=""/3, 0x3}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 12:25:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') 12:25:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x401}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x28}}], 0x2, 0x0) 12:25:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') 12:25:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) preadv(r0, &(0x7f00000017c0), 0x1bf, 0x0) 12:25:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') 12:25:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x401}, 0x1c, 0x0, 0x0, &(0x7f0000000980)=[@pktinfo={{0x24, 0x29, 0x32, {@empty}}}], 0x28}}], 0x2, 0x0) 12:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0xfcd8, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0xff5d) recvmmsg(r2, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000dc0)=""/3, 0x3}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 12:25:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0xfcd8, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0xff5d) recvmmsg(r2, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000dc0)=""/3, 0x3}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 12:25:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') 12:25:06 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000100)='GP\xcf\xf3', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000000)={'eql\x00\x03\x00\x00\x005\x00', @ifru_flags=0x2}) 12:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:06 executing program 3: getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, 0x0, 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x2, 0x4, 0x4, 0x234, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x40096102, &(0x7f00000000c0)) 12:25:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0xfcd8, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0xff5d) recvmmsg(r2, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000dc0)=""/3, 0x3}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 12:25:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') 12:25:06 executing program 3: getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, 0x0, 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x2, 0x4, 0x4, 0x234, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x40096102, &(0x7f00000000c0)) 12:25:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') 12:25:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0xfcd8, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0xff5d) recvmmsg(r2, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000dc0)=""/3, 0x3}, {&(0x7f00000027c0)=""/4096, 0x1000}], 0x2}}], 0x2, 0x0, 0x0) 12:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 3: getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, 0x0, 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x2, 0x4, 0x4, 0x234, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x40096102, &(0x7f00000000c0)) 12:25:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 3: getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, 0x0, 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x2, 0x4, 0x4, 0x234, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x40096102, &(0x7f00000000c0)) 12:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000080)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x45c) ioctl$UI_DEV_CREATE(r1, 0x5501) 12:25:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="adc3833d7f3a9d38aa9d55425a3b128e"}, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x48) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:25:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={[{@fat=@allow_utime={'allow_utime'}}]}) 12:25:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) 12:25:07 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@ipv6_deladdr={0x2c, 0x15, 0x301, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @remote}]}, 0x2c}}, 0x0) 12:25:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003740)=[{{&(0x7f0000002a80)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f0000002dc0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6}]}}}], 0x18}}], 0x1, 0x0) 12:25:07 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xffdc}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:07 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x103b0e93b836670b, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x20000000014) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 12:25:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 12:25:08 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@ipv6_deladdr={0x2c, 0x15, 0x301, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @remote}]}, 0x2c}}, 0x0) 12:25:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003740)=[{{&(0x7f0000002a80)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f0000002dc0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6}]}}}], 0x18}}], 0x1, 0x0) 12:25:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @local}}]}, 0x190) 12:25:08 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xffdc}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 12:25:08 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xffdc}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:08 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@ipv6_deladdr={0x2c, 0x15, 0x301, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @remote}]}, 0x2c}}, 0x0) 12:25:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003740)=[{{&(0x7f0000002a80)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f0000002dc0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6}]}}}], 0x18}}], 0x1, 0x0) 12:25:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @local}}]}, 0x190) 12:25:08 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xffdc}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000080)={0x20080522, r1}, &(0x7f00000000c0)) 12:25:08 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@ipv6_deladdr={0x2c, 0x15, 0x301, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @remote}]}, 0x2c}}, 0x0) 12:25:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 12:25:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @local}}]}, 0x190) 12:25:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003740)=[{{&(0x7f0000002a80)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f0000002dc0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6}]}}}], 0x18}}], 0x1, 0x0) 12:25:08 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xffdc}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0xfd89) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @local}}]}, 0x190) 12:25:08 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xffdc}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x5, 0x0, &(0x7f0000000040)) 12:25:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x4, 0x0, 0x3}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:25:08 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:08 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000080)={0x20080522, r1}, &(0x7f00000000c0)) 12:25:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe6f, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xd000]}]}, 0x44}}, 0x0) 12:25:08 executing program 2: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xffdc}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x2f, 0x2000000003ff, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 12:25:09 executing program 2: msgctl$IPC_INFO(0x0, 0xfffffffe, 0x0) 12:25:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe6f, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xd000]}]}, 0x44}}, 0x0) 12:25:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000080)={0x20080522, r1}, &(0x7f00000000c0)) 12:25:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x2f, 0x2000000003ff, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 12:25:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000080)={0x20080522, r1}, &(0x7f00000000c0)) 12:25:09 executing program 2: msgctl$IPC_INFO(0x0, 0xfffffffe, 0x0) [ 978.160680][ T26] audit: type=1804 audit(1560947109.189:481): pid=28340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir192673869/syzkaller.KJEb3f/1734/memory.events" dev="sda1" ino=17502 res=1 [ 978.221483][ T26] audit: type=1800 audit(1560947109.189:482): pid=28340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=17502 res=0 12:25:09 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 978.355056][ T26] audit: type=1804 audit(1560947109.389:483): pid=28340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir192673869/syzkaller.KJEb3f/1734/memory.events" dev="sda1" ino=17502 res=1 [ 978.381595][ T26] audit: type=1800 audit(1560947109.389:484): pid=28340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=17502 res=0 [ 978.503104][ C0] net_ratelimit: 12 callbacks suppressed [ 978.503114][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 978.514693][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 978.583078][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 978.589142][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 978.691210][ T26] audit: type=1804 audit(1560947109.719:485): pid=28358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir192673869/syzkaller.KJEb3f/1735/memory.events" dev="sda1" ino=17138 res=1 12:25:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe6f, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xd000]}]}, 0x44}}, 0x0) 12:25:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x2f, 0x2000000003ff, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 12:25:09 executing program 2: msgctl$IPC_INFO(0x0, 0xfffffffe, 0x0) 12:25:09 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:09 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001b403a7d0020e2000000180000000000", 0x2e}], 0x1}, 0x0) [ 978.729637][ T26] audit: type=1800 audit(1560947109.719:486): pid=28358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=17138 res=0 12:25:09 executing program 2: msgctl$IPC_INFO(0x0, 0xfffffffe, 0x0) 12:25:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x2f, 0x2000000003ff, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) [ 978.810813][T28369] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 12:25:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe6f, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0xd000]}]}, 0x44}}, 0x0) 12:25:09 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001b403a7d0020e2000000180000000000", 0x2e}], 0x1}, 0x0) 12:25:09 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 978.991758][T28379] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 12:25:10 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001b403a7d0020e2000000180000000000", 0x2e}], 0x1}, 0x0) [ 979.221844][T28392] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 12:25:10 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 979.303045][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 979.309021][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 979.314982][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 979.320882][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 979.383236][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 979.389644][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 979.557347][ T26] audit: type=1804 audit(1560947110.589:487): pid=28398 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir192673869/syzkaller.KJEb3f/1737/memory.events" dev="sda1" ino=17476 res=1 [ 979.586282][ T26] audit: type=1800 audit(1560947110.619:488): pid=28398 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=17476 res=0 12:25:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:10 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12001b403a7d0020e2000000180000000000", 0x2e}], 0x1}, 0x0) [ 979.682539][ T26] audit: type=1804 audit(1560947110.709:489): pid=28393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir180532121/syzkaller.9qWk1r/1768/memory.events" dev="sda1" ino=17512 res=1 [ 979.708779][ T26] audit: type=1800 audit(1560947110.709:490): pid=28393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="memory.events" dev="sda1" ino=17512 res=0 12:25:10 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) [ 979.764300][T28400] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 12:25:10 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:10 executing program 1: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:11 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:11 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:11 executing program 1: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:11 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:11 executing program 1: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:11 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:11 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffffffff) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:25:12 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:12 executing program 1: syz_open_dev$adsp(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 12:25:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000001ee8)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 12:25:12 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x501e}) ioctl$TUNSETNOCSUM(r0, 0x400454cb, 0x0) 12:25:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000001ee8)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 12:25:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000040000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000040000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f00000000c0)="b825008ed00f01c86766c7442400cb4443ca6766c7442402008800006766c744240600000000670f0114240f01c8cbf021290f01c90f01bb0800673e3e80f9f266b9800000c00f326635002000000f30", 0x50}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000003b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:25:12 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queqe1\x00\x00\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003sl\x7f\xa0&\r\x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\xed\x00\x00\x00\x00\x00\x17\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 12:25:13 executing program 1: syz_open_dev$adsp(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 12:25:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000180), 0x20000182) 12:25:13 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x7, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x5}]}, {0x0, [0x2e, 0x5f, 0x7f]}}, &(0x7f00000002c0)=""/218, 0x29, 0xda, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffff9c, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r0, 0x10, &(0x7f0000000700)={&(0x7f00000003c0)=""/99, 0x63, r1}}, 0x10) socketpair(0x5, 0x0, 0x4, &(0x7f0000000500)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x99, 0x5, 0x80000001, 0x88, 0x1, 0x9, [], 0x0, 0xffffffffffffff9c, 0x0, 0x1}, 0x3c) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1702) 12:25:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000001ee8)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 12:25:13 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpriority(0x1, 0x0) 12:25:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet6_buf(r1, 0x6, 0xc, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 12:25:13 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpriority(0x1, 0x0) 12:25:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f0000001ee8)={0x2, 0x18, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 12:25:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet6_buf(r1, 0x6, 0xc, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 12:25:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') sendfile(r0, r0, 0x0, 0x8000) 12:25:13 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpriority(0x1, 0x0) 12:25:13 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queqe1\x00\x00\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003sl\x7f\xa0&\r\x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\xed\x00\x00\x00\x00\x00\x17\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 12:25:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet6_buf(r1, 0x6, 0xc, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 12:25:13 executing program 1: syz_open_dev$adsp(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 12:25:13 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(r0, 0x5424, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0xffffa888, 0x6, "06f526", 0x8, 0x2f, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x8) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='sync\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x3, 0xb2, "ae68b14dc1917288d169ee0f8761893ef8124f5043b29a10ecaf8fc715c1fb2cacf4352a8494258b1ac7396faa10e50e01a5ac78b30da89447cc8dd4ce47a11b969c4df4ca72aaf564558a85d44cfbabe5b4cbf13ec561f5eaf41ad86971ba45b8d35f32dd49655b4f7982a1e95a79a233a2b0959494f0605f8a9453bfc4468f2f63acb590ca79f669460d7faf0492b8a7155b520f74daad6c20e9084351afd3733df76385e6f8c4bdc6de9d4de527209a79"}) 12:25:13 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpriority(0x1, 0x0) 12:25:13 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet6_buf(r1, 0x6, 0xc, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 12:25:14 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(r0, 0x5424, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0xffffa888, 0x6, "06f526", 0x8, 0x2f, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x8) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='sync\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x3, 0xb2, "ae68b14dc1917288d169ee0f8761893ef8124f5043b29a10ecaf8fc715c1fb2cacf4352a8494258b1ac7396faa10e50e01a5ac78b30da89447cc8dd4ce47a11b969c4df4ca72aaf564558a85d44cfbabe5b4cbf13ec561f5eaf41ad86971ba45b8d35f32dd49655b4f7982a1e95a79a233a2b0959494f0605f8a9453bfc4468f2f63acb590ca79f669460d7faf0492b8a7155b520f74daad6c20e9084351afd3733df76385e6f8c4bdc6de9d4de527209a79"}) 12:25:14 executing program 2: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(r0, 0x5424, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0xffffa888, 0x6, "06f526", 0x8, 0x2f, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x8) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='sync\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x3, 0xb2, "ae68b14dc1917288d169ee0f8761893ef8124f5043b29a10ecaf8fc715c1fb2cacf4352a8494258b1ac7396faa10e50e01a5ac78b30da89447cc8dd4ce47a11b969c4df4ca72aaf564558a85d44cfbabe5b4cbf13ec561f5eaf41ad86971ba45b8d35f32dd49655b4f7982a1e95a79a233a2b0959494f0605f8a9453bfc4468f2f63acb590ca79f669460d7faf0492b8a7155b520f74daad6c20e9084351afd3733df76385e6f8c4bdc6de9d4de527209a79"}) 12:25:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="4ef27f454c4600000001006c0000000000000000003d000000000000000038000000000095691f2d48d5ba213e1900000000000000202000"], 0x38) 12:25:14 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:14 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(r0, 0x5424, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0xffffa888, 0x6, "06f526", 0x8, 0x2f, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x8) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='sync\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x3, 0xb2, "ae68b14dc1917288d169ee0f8761893ef8124f5043b29a10ecaf8fc715c1fb2cacf4352a8494258b1ac7396faa10e50e01a5ac78b30da89447cc8dd4ce47a11b969c4df4ca72aaf564558a85d44cfbabe5b4cbf13ec561f5eaf41ad86971ba45b8d35f32dd49655b4f7982a1e95a79a233a2b0959494f0605f8a9453bfc4468f2f63acb590ca79f669460d7faf0492b8a7155b520f74daad6c20e9084351afd3733df76385e6f8c4bdc6de9d4de527209a79"}) [ 983.543086][ C1] net_ratelimit: 18 callbacks suppressed [ 983.543096][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 983.554774][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:14 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queqe1\x00\x00\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003sl\x7f\xa0&\r\x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\xed\x00\x00\x00\x00\x00\x17\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 12:25:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="4ef27f454c4600000001006c0000000000000000003d000000000000000038000000000095691f2d48d5ba213e1900000000000000202000"], 0x38) 12:25:14 executing program 2: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(r0, 0x5424, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0xffffa888, 0x6, "06f526", 0x8, 0x2f, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x8) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='sync\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x3, 0xb2, "ae68b14dc1917288d169ee0f8761893ef8124f5043b29a10ecaf8fc715c1fb2cacf4352a8494258b1ac7396faa10e50e01a5ac78b30da89447cc8dd4ce47a11b969c4df4ca72aaf564558a85d44cfbabe5b4cbf13ec561f5eaf41ad86971ba45b8d35f32dd49655b4f7982a1e95a79a233a2b0959494f0605f8a9453bfc4468f2f63acb590ca79f669460d7faf0492b8a7155b520f74daad6c20e9084351afd3733df76385e6f8c4bdc6de9d4de527209a79"}) 12:25:14 executing program 1: syz_open_dev$adsp(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 12:25:14 executing program 3: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(r0, 0x5424, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0xffffa888, 0x6, "06f526", 0x8, 0x2f, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x8) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='sync\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x3, 0xb2, "ae68b14dc1917288d169ee0f8761893ef8124f5043b29a10ecaf8fc715c1fb2cacf4352a8494258b1ac7396faa10e50e01a5ac78b30da89447cc8dd4ce47a11b969c4df4ca72aaf564558a85d44cfbabe5b4cbf13ec561f5eaf41ad86971ba45b8d35f32dd49655b4f7982a1e95a79a233a2b0959494f0605f8a9453bfc4468f2f63acb590ca79f669460d7faf0492b8a7155b520f74daad6c20e9084351afd3733df76385e6f8c4bdc6de9d4de527209a79"}) 12:25:14 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="4ef27f454c4600000001006c0000000000000000003d000000000000000038000000000095691f2d48d5ba213e1900000000000000202000"], 0x38) 12:25:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="4ef27f454c4600000001006c0000000000000000003d000000000000000038000000000095691f2d48d5ba213e1900000000000000202000"], 0x38) 12:25:14 executing program 2: ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) ioctl$TIOCGETD(r0, 0x5424, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="59cc9ee6e8e1", @random="164f1c10fcad", [], {@ipv6={0x86dd, {0xffffa888, 0x6, "06f526", 0x8, 0x2f, 0x0, @empty={[0x0, 0x1f4, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x8) ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='sync\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x3, 0xb2, "ae68b14dc1917288d169ee0f8761893ef8124f5043b29a10ecaf8fc715c1fb2cacf4352a8494258b1ac7396faa10e50e01a5ac78b30da89447cc8dd4ce47a11b969c4df4ca72aaf564558a85d44cfbabe5b4cbf13ec561f5eaf41ad86971ba45b8d35f32dd49655b4f7982a1e95a79a233a2b0959494f0605f8a9453bfc4468f2f63acb590ca79f669460d7faf0492b8a7155b520f74daad6c20e9084351afd3733df76385e6f8c4bdc6de9d4de527209a79"}) [ 983.688140][ T26] kauditd_printk_skb: 18 callbacks suppressed [ 983.688156][ T26] audit: type=1800 audit(1560947114.719:509): pid=29135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17541 res=0 12:25:14 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="4ef27f454c4600000001006c0000000000000000003d000000000000000038000000000095691f2d48d5ba213e1900000000000000202000"], 0x38) 12:25:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="4ef27f454c4600000001006c0000000000000000003d000000000000000038000000000095691f2d48d5ba213e1900000000000000202000"], 0x38) 12:25:15 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queqe1\x00\x00\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003sl\x7f\xa0&\r\x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\xed\x00\x00\x00\x00\x00\x17\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 12:25:15 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="4ef27f454c4600000001006c0000000000000000003d000000000000000038000000000095691f2d48d5ba213e1900000000000000202000"], 0x38) 12:25:15 executing program 4: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:15 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:15 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:15 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:15 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000006200)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) 12:25:15 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) [ 984.743081][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 984.749063][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:25:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000006200)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) [ 984.823829][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 984.839747][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:15 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:16 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000006200)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) 12:25:16 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 12:25:16 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000006200)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) 12:25:16 executing program 1: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 12:25:16 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:16 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) fstat(r0, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@local, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@dev}}, 0x0) mount$9p_rdma(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BLKROSET(r1, 0x125d, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x0) chdir(0x0) 12:25:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x16}]}) [ 985.543038][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 985.548925][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 985.554908][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 985.560760][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:16 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) write$P9_RLOCK(r3, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 12:25:16 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:16 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 12:25:16 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 12:25:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000010007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e10000000160a43ba5d806055b6fdd80b", 0x34}], 0x1}, 0x0) 12:25:17 executing program 1: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:17 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000010007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e10000000160a43ba5d806055b6fdd80b", 0x34}], 0x1}, 0x0) 12:25:17 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 12:25:17 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000010007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e10000000160a43ba5d806055b6fdd80b", 0x34}], 0x1}, 0x0) 12:25:17 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 12:25:17 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:17 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000003c0)=""/254, 0xfe) lseek(r0, 0x0, 0x0) 12:25:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000010007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e10000000160a43ba5d806055b6fdd80b", 0x34}], 0x1}, 0x0) 12:25:18 executing program 1: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 12:25:18 executing program 0: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:18 executing program 2: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:18 executing program 4: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:18 executing program 3: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 12:25:19 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:19 executing program 4: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:19 executing program 0: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:19 executing program 3: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:19 executing program 2: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) [ 988.904728][ C0] net_ratelimit: 12 callbacks suppressed [ 988.904787][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 988.918240][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 988.985271][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 988.992998][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 989.703072][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 989.709021][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 989.715015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 989.720884][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:20 executing program 1: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:20 executing program 2: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:20 executing program 4: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:20 executing program 0: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) [ 989.783042][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 989.788952][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:20 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:20 executing program 3: syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000001e40)=""/64, 0x40}], 0x2, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000003700)=[{0x0}], 0x1, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000008340)=""/4096, 0x1000, 0x49e1}}], 0x3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, &(0x7f0000000480)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x3f, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) ptrace$setregs(0xd, 0x0, 0x10000000c5, &(0x7f0000000700)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept$alg(r0, 0x0, 0x0) 12:25:21 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:22 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:22 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:22 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') socket$nl_route(0x10, 0x3, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) unshare(0x40000000) [ 991.390060][T30132] IPVS: ftp: loaded support on port[0] = 21 [ 991.731768][T30132] IPVS: ftp: loaded support on port[0] = 21 12:25:23 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') socket$nl_route(0x10, 0x3, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) unshare(0x40000000) 12:25:24 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) [ 993.943836][ C1] net_ratelimit: 18 callbacks suppressed [ 993.943886][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 993.956912][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:25 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:25 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:25 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:25 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') socket$nl_route(0x10, 0x3, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) unshare(0x40000000) [ 995.144895][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 995.153348][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 995.223906][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 995.231393][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:26 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) [ 995.944200][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 995.951406][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 995.959378][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 995.966471][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:27 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:27 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:27 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000001) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000001400)={0x0, 0xe5, "e64e32a9132a1e3626b206a962f76b6082bf927aac5f08e7d501a03652da5a929b74852d940802e92ece1bc7205b89effa7aea902bed5917286facd018428e8aaa64dae2c1307229487dfa5525fcfe95479e03e8afa01c646c3a71222812ac813c5ee57db57504eecc02be4735049b17b3750303234ac52d2522eb266252e5872b00c4c81bd09680bf583c0e9940e3e56a1a4809f3ed80c0fd2c01ac8fb79f72de3b06296fae5577d829fb799e3e60fdc905b72f6eb8acef49d5bcdc506be4d71019a9bc41379e54ebaab11c3efb672237f1ff2140e2a1bae8926c4af7fa53400d7060cc42"}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) 12:25:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:29 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x420, &(0x7f0000000180)=ANY=[@ANYBLOB='mode=']) 12:25:30 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') socket$nl_route(0x10, 0x3, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) unshare(0x40000000) 12:25:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x420, &(0x7f0000000180)=ANY=[@ANYBLOB='mode=']) 12:25:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:30 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') socket$nl_route(0x10, 0x3, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) unshare(0x40000000) 12:25:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x420, &(0x7f0000000180)=ANY=[@ANYBLOB='mode=']) [ 999.314569][ C0] net_ratelimit: 12 callbacks suppressed [ 999.314610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 999.328284][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 999.384389][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 999.391638][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x420, &(0x7f0000000180)=ANY=[@ANYBLOB='mode=']) 12:25:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) [ 1000.103039][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1000.109005][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1000.115064][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1000.120892][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1000.183040][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1000.188997][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:31 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') socket$nl_route(0x10, 0x3, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) unshare(0x40000000) 12:25:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff170000000000000000000000000017000000ff00000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 12:25:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000840)=[{{&(0x7f0000000100)={0x2, 0x9af, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x8, 0x4, 0x0, [{[@multicast1]}]}]}}}], 0x20}}, {{&(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x2, 0x0) 12:25:31 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') socket$nl_route(0x10, 0x3, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) unshare(0x40000000) [ 1001.066140][T30455] IPVS: ftp: loaded support on port[0] = 21 [ 1001.116044][T30456] IPVS: ftp: loaded support on port[0] = 21 12:25:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000840)=[{{&(0x7f0000000100)={0x2, 0x9af, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x8, 0x4, 0x0, [{[@multicast1]}]}]}}}], 0x20}}, {{&(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10, 0x0}}], 0x2, 0x0) 12:25:32 executing program 0: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="5c125100000000000000000000000000fbbdd6291994ccbf85add690c7b2cb87f0ba1269506dd3f595c4780786982f0ebf4876879aa4510f62a78733d7ea5b6b541233a1c8b2f8d76b4e891f781fac1dd5d95068ff0028a1797cc98f3406b583c6c33d76be67cdaf69fe531992777458543d79969f2ce7a8050102eb67a0b6c396a4527f09bde13a798d8b7c1f80976da2d8028005118f9ded14562993289ae41e201d6901ab330f6ea684628fd50a3105a13ff8abfdc22a9089ec6d65fff37c94263ddf05295fa0ca1f18442e7db5ccc4fb847197ad6fe0e4b636a8fe18a10ddc2d376239d903317cd85c3708f09c525e92305b51b256c6e356cb5134ccfe188cd8fd259a746692ffaa430fd37ad1ce371b8d2bdfaa7a57764c6f9d8c6b6f28f760a39987a3b54361028083bebb036a5eeb8200d66b927a00b96ef5f7edb6c098aa360379961e9c09000000f74f30ba957bb0de0e48dcccaf817e24fa560e5ef10b8fb65a8b9ee1bc28aa629589cbe02399c38d43549315740955db44018157918b5c0de976cb48decc95988d44282b6a0799cb1479d97cced01facc8e009177beb0db7aee6b727070eb0c0f6b01c8409e4d01a0209d784353f163205000000000000008238920b0a6a255cf281aed15c3fe4ae0ec761773a3ac35f5177d3574be71707036cc3839e0000006bb5932a8969669489311bea30877d0778a9a75bacc84815e24d2aef218904cae20e7f78ee5165bf255b2a7f8b0232cc657daa16041528f28973e3e02aed0a6a58dcdb0ed98c7e5f0cd653351e55ac346579527ffe53ac80055bd8db7ef8d03889dc01612fa368f52455c7bf6af9ff5fd16270bceadf5a00"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:33 executing program 2: r0 = socket$packet(0x11, 0xa, 0x300) getsockname$packet(r0, 0x0, &(0x7f00000000c0)) 12:25:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:34 executing program 4: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:34 executing program 0: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="025c762038aeb77538031367687e41515dfa0bfd4a1417ff27bf4d560eac82d44bbe2e2a3af1db77ae8073ddd8780bddd30a7bee01742d7126c27b0baf8ceb584aae67909bf7d190afc06d5e83d2caae39e0ffdf90bbdbd3805ec2284ff8e3844fdb2abf0293c027e5fdadf02a278fd891de9347cc74da3a2e7c8280cff965b9074253bc3db306769f7576f36817c9a7ef13866e9012129fdcc0fa6abac30d7941953b4fc8316402bdc14f98664ad6105a6526dd4971296a9e25237aa5c677a67dbc4d370e2db5d6c6f8671366b9dd9ca167ac7ff4cf69900031428faa4f5209df8a9a4564e26bc87ca1674024c02ef5c3b75db58539b180ce7860a4daee76d04d2af07925d06b1902b74a65ffda708e89474207fb5474aaf4d427e8d2a64301b27c3f1549244c9cff1eea4ff11b2e5edf01e6b6d7b3a5903a1ac7966426e95353afa8ff1fbce7a75bc073756f23d85e9e1dd95b33062414dfe149f654bfe41ce89fa9f5f6b7120209f2baf8371926c82b7075e706010ef9710665a2fd0d650c4dce82107db493b36eceac473e8aff73515800f342149c500c6bf53e5d0a7fac6407daf71cc7836780393494891779a6f0dc92b24c6f86fb0cd515ce6f932f8a04847289405984") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="5c125100000000000000000000000000fbbdd6291994ccbf85add690c7b2cb87f0ba1269506dd3f595c4780786982f0ebf4876879aa4510f62a78733d7ea5b6b541233a1c8b2f8d76b4e891f781fac1dd5d95068ff0028a1797cc98f3406b583c6c33d76be67cdaf69fe531992777458543d79969f2ce7a8050102eb67a0b6c396a4527f09bde13a798d8b7c1f80976da2d8028005118f9ded14562993289ae41e201d6901ab330f6ea684628fd50a3105a13ff8abfdc22a9089ec6d65fff37c94263ddf05295fa0ca1f18442e7db5ccc4fb847197ad6fe0e4b636a8fe18a10ddc2d376239d903317cd85c3708f09c525e92305b51b256c6e356cb5134ccfe188cd8fd259a746692ffaa430fd37ad1ce371b8d2bdfaa7a57764c6f9d8c6b6f28f760a39987a3b54361028083bebb036a5eeb8200d66b927a00b96ef5f7edb6c098aa360379961e9c09000000f74f30ba957bb0de0e48dcccaf817e24fa560e5ef10b8fb65a8b9ee1bc28aa629589cbe02399c38d43549315740955db44018157918b5c0de976cb48decc95988d44282b6a0799cb1479d97cced01facc8e009177beb0db7aee6b727070eb0c0f6b01c8409e4d01a0209d784353f163205000000000000008238920b0a6a255cf281aed15c3fe4ae0ec761773a3ac35f5177d3574be71707036cc3839e0000006bb5932a8969669489311bea30877d0778a9a75bacc84815e24d2aef218904cae20e7f78ee5165bf255b2a7f8b0232cc657daa16041528f28973e3e02aed0a6a58dcdb0ed98c7e5f0cd653351e55ac346579527ffe53ac80055bd8db7ef8d03889dc01612fa368f52455c7bf6af9ff5fd16270bceadf5a00"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:34 executing program 2: r0 = socket$packet(0x11, 0xa, 0x300) getsockname$packet(r0, 0x0, &(0x7f00000000c0)) 12:25:34 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:35 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:35 executing program 4: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:35 executing program 0: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:35 executing program 4: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) [ 1004.343139][ C1] net_ratelimit: 18 callbacks suppressed [ 1004.343150][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1004.354807][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:35 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:35 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:35 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:35 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:36 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:36 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:36 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) [ 1005.551297][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1005.560146][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1005.623125][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1005.629058][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:36 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:37 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:37 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) [ 1006.343120][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1006.349010][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1006.355015][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1006.360968][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:37 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:37 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:37 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:38 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:38 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:38 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:38 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:38 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:39 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:39 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:40 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:40 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:40 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) [ 1009.703043][ C0] net_ratelimit: 12 callbacks suppressed [ 1009.703054][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1009.714747][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:25:40 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) [ 1009.783103][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1009.789082][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:41 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="020000000000008000000005a018000059d40000c09baa220c1211d5f233789da1953c93d8e2499c8a5e8840e50000000000dfffffff0000000000006ffdb13ca811b742b8fbb3765149447fbf80d811a37d9a065165c91192cd324745691f52e22b3f98c8f790eb7eed95901f942b61c9dad53fe60dc9ef7acfe3c566a6ec996cb3285b7b4436e67e494b365394d578235d1d9fdf2a5fd368cc3fb52b21e84eeb2b6afec76e4d1a069c348e71a47f3db8fad7566345ca0079cf0f0887edba96782b4b1ea9fa0928cb5f3e9211d431874a3991525d477afd14978ec32816b09e0612e05eec2501deb7b962b3c6e2145df41fe76aaf06e1127022c3c2b35041c72d532caa4dd1b8c0aa548a1d854857e341b1ce0cecb1a7713ab431f3b3788a5db1f5f10a3fbb3ac24f5c4c8e09772ba449e311f7dabeb36d569247348a2cfd91bd099d0f2fd07f996436fdb834fe50eb4ac3d7fb3920a0678d3c6611a6ca19f16d72cd7232240439e1ebd60259a15e8004a3bd1e342ea65468d1cdd54dd49a95f047bf09771f4af2523f05d5a9c18e5f9d9da44327d3303b2b25ddd809f374180b4b4ae17e55d227a74b76c59009d51267558ba100266a9731af03331a5e7daed8301590e75b439840d64e7f545b2f7f2f8fc4c53c91c7d463e4dacd510bd54000a2ee0f5dae57d5923770d1050b626db28d943eb05ed352c3b32fca7fbdb25e18af3d19c78e765c4ce60611a056430d28a64b114e9ec4bb85e0bff98a58"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:41 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:41 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96c92a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195cd5256a09e8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53e6aaf4f2dec9ddfb4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c178bce65ed205154ab4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) [ 1010.503030][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1010.508966][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1010.514925][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1010.520746][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1010.583558][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1010.590202][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:41 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="5c125100000000000000000000000000fbbdd6291994ccbf85add690c7b2cb87f0ba1269506dd3f595c4780786982f0ebf4876879aa4510f62a78733d7ea5b6b541233a1c8b2f8d76b4e891f781fac1dd5d95068ff0028a1797cc98f3406b583c6c33d76be67cdaf69fe531992777458543d79969f2ce7a8050102eb67a0b6c396a4527f09bde13a798d8b7c1f80976da2d8028005118f9ded14562993289ae41e201d6901ab330f6ea684628fd50a3105a13ff8abfdc22a9089ec6d65fff37c94263ddf05295fa0ca1f18442e7db5ccc4fb847197ad6fe0e4b636a8fe18a10ddc2d376239d903317cd85c3708f09c525e92305b51b256c6e356cb5134ccfe188cd8fd259a746692ffaa430fd37ad1ce371b8d2bdfaa7a57764c6f9d8c6b6f28f760a39987a3b54361028083bebb036a5eeb8200d66b927a00b96ef5f7edb6c098aa360379961e9c09000000f74f30ba957bb0de0e48dcccaf817e24fa560e5ef10b8fb65a8b9ee1bc28aa629589cbe02399c38d43549315740955db44018157918b5c0de976cb48decc95988d44282b6a0799cb1479d97cced01facc8e009177beb0db7aee6b727070eb0c0f6b01c8409e4d01a0209d784353f163205000000000000008238920b0a6a255cf281aed15c3fe4ae0ec761773a3ac35f5177d3574be71707036cc3839e0000006bb5932a8969669489311bea30877d0778a9a75bacc84815e24d2aef218904cae20e7f78ee5165bf255b2a7f8b0232cc657daa16041528f28973e3e02aed0a6a58dcdb0ed98c7e5f0cd653351e55ac346579527ffe53ac80055bd8db7ef8d03889dc01612fa368f52455c7bf6af9ff5fd16270bceadf5a00"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:41 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:42 executing program 3: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:42 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x85', 0x181000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x100000004, 0x4, 0x83d3}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x43, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0xacc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x10000, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) r5 = socket$kcm(0x2, 0x3, 0x2) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0xc671, 0xc000, 0x0, 0x27, 0x0, 0x401, 0x8, 0x0, 0x0, 0x101, 0x9, 0x7f, 0x7, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x8000, 0x0, 0x400, 0x9, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x26010, 0x400, 0x0, 0x3, 0x2}, 0xffffffffffffffff, 0xc, r6, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)='&@[\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x6, 0x0) sendmsg$kcm(r5, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000001580)='&@[\x00') perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback, 0x200}}}, 0x80, 0x0}, 0x80) 12:25:42 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:42 executing program 5: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:42 executing program 3: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:42 executing program 2: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:42 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96c92a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195cd5256a09e8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53e6aaf4f2dec9ddfb4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c178bce65ed205154ab4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:42 executing program 5: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:42 executing program 3: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:42 executing program 2: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 0: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 5: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 3: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 4: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="5c125100000000000000000000000000fbbdd6291994ccbf85add690c7b2cb87f0ba1269506dd3f595c4780786982f0ebf4876879aa4510f62a78733d7ea5b6b541233a1c8b2f8d76b4e891f781fac1dd5d95068ff0028a1797cc98f3406b583c6c33d76be67cdaf69fe531992777458543d79969f2ce7a8050102eb67a0b6c396a4527f09bde13a798d8b7c1f80976da2d8028005118f9ded14562993289ae41e201d6901ab330f6ea684628fd50a3105a13ff8abfdc22a9089ec6d65fff37c94263ddf05295fa0ca1f18442e7db5ccc4fb847197ad6fe0e4b636a8fe18a10ddc2d376239d903317cd85c3708f09c525e92305b51b256c6e356cb5134ccfe188cd8fd259a746692ffaa430fd37ad1ce371b8d2bdfaa7a57764c6f9d8c6b6f28f760a39987a3b54361028083bebb036a5eeb8200d66b927a00b96ef5f7edb6c098aa360379961e9c09000000f74f30ba957bb0de0e48dcccaf817e24fa560e5ef10b8fb65a8b9ee1bc28aa629589cbe02399c38d43549315740955db44018157918b5c0de976cb48decc95988d44282b6a0799cb1479d97cced01facc8e009177beb0db7aee6b727070eb0c0f6b01c8409e4d01a0209d784353f163205000000000000008238920b0a6a255cf281aed15c3fe4ae0ec761773a3ac35f5177d3574be71707036cc3839e0000006bb5932a8969669489311bea30877d0778a9a75bacc84815e24d2aef218904cae20e7f78ee5165bf255b2a7f8b0232cc657daa16041528f28973e3e02aed0a6a58dcdb0ed98c7e5f0cd653351e55ac346579527ffe53ac80055bd8db7ef8d03889dc01612fa368f52455c7bf6af9ff5fd16270bceadf5a00"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96c92a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195cd5256a09e8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53e6aaf4f2dec9ddfb4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c178bce65ed205154ab4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 2: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 0: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 4: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="5c125100000000000000000000000000fbbdd6291994ccbf85add690c7b2cb87f0ba1269506dd3f595c4780786982f0ebf4876879aa4510f62a78733d7ea5b6b541233a1c8b2f8d76b4e891f781fac1dd5d95068ff0028a1797cc98f3406b583c6c33d76be67cdaf69fe531992777458543d79969f2ce7a8050102eb67a0b6c396a4527f09bde13a798d8b7c1f80976da2d8028005118f9ded14562993289ae41e201d6901ab330f6ea684628fd50a3105a13ff8abfdc22a9089ec6d65fff37c94263ddf05295fa0ca1f18442e7db5ccc4fb847197ad6fe0e4b636a8fe18a10ddc2d376239d903317cd85c3708f09c525e92305b51b256c6e356cb5134ccfe188cd8fd259a746692ffaa430fd37ad1ce371b8d2bdfaa7a57764c6f9d8c6b6f28f760a39987a3b54361028083bebb036a5eeb8200d66b927a00b96ef5f7edb6c098aa360379961e9c09000000f74f30ba957bb0de0e48dcccaf817e24fa560e5ef10b8fb65a8b9ee1bc28aa629589cbe02399c38d43549315740955db44018157918b5c0de976cb48decc95988d44282b6a0799cb1479d97cced01facc8e009177beb0db7aee6b727070eb0c0f6b01c8409e4d01a0209d784353f163205000000000000008238920b0a6a255cf281aed15c3fe4ae0ec761773a3ac35f5177d3574be71707036cc3839e0000006bb5932a8969669489311bea30877d0778a9a75bacc84815e24d2aef218904cae20e7f78ee5165bf255b2a7f8b0232cc657daa16041528f28973e3e02aed0a6a58dcdb0ed98c7e5f0cd653351e55ac346579527ffe53ac80055bd8db7ef8d03889dc01612fa368f52455c7bf6af9ff5fd16270bceadf5a00"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 5: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 2: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 3: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 0: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0x2b7}], 0x1, 0x0) 12:25:43 executing program 4: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:44 executing program 5: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96c92a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195cd5256a09e8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53e6aaf4f2dec9ddfb4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c178bce65ed205154ab4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:44 executing program 3: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="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") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:44 executing program 0: setreuid(0x0, 0xee00) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89e0, 0x0) 12:25:44 executing program 2: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96c92a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195cd5256a09e8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53e6aaf4f2dec9ddfb4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c178bce65ed205154ab4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:44 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f00000000c0), 0x4) 12:25:44 executing program 0: setreuid(0x0, 0xee00) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89e0, 0x0) 12:25:44 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:44 executing program 5: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="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"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96c92a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195cd5256a09e8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53e6aaf4f2dec9ddfb4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c178bce65ed205154ab4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:44 executing program 1: unshare(0x400) r0 = socket$inet6(0xa, 0x2, 0x0) syncfs(r0) 12:25:44 executing program 0: setreuid(0x0, 0xee00) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89e0, 0x0) 12:25:44 executing program 2: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x4202}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x8000}, {}], 0x6, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={0x3}, 0x2) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x24000, 0x0) r1 = syz_open_pts(r0, 0x8102) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000200)=0x18) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000040)='./bus\x00') r3 = socket$inet6(0xa, 0xf, 0xd) r4 = fcntl$getown(r3, 0x9) ptrace$pokeuser(0x6, r4, 0x0, 0x7) ioctl(r3, 0x6, &(0x7f0000000dc0)="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") r5 = creat(&(0x7f0000000440)='./bus\x00', 0x4) rmdir(&(0x7f0000000300)='./bus\x00') ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000900)={@mcast2, @remote, @mcast2, 0x2, 0xfffffffffffffffe, 0x7fffffff, 0x100000000000400, 0x84, 0x617, r6}) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYPTR64=&(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000001240)=ANY=[@ANYBLOB="5c125100000000000000000000000000fbbdd6291994ccbf85add690c7b2cb87f0ba1269506dd3f595c4780786982f0ebf4876879aa4510f62a78733d7ea5b6b541233a1c8b2f8d76b4e891f781fac1dd5d95068ff0028a1797cc98f3406b583c6c33d76be67cdaf69fe531992777458543d79969f2ce7a8050102eb67a0b6c396a4527f09bde13a798d8b7c1f80976da2d8028005118f9ded14562993289ae41e201d6901ab330f6ea684628fd50a3105a13ff8abfdc22a9089ec6d65fff37c94263ddf05295fa0ca1f18442e7db5ccc4fb847197ad6fe0e4b636a8fe18a10ddc2d376239d903317cd85c3708f09c525e92305b51b256c6e356cb5134ccfe188cd8fd259a746692ffaa430fd37ad1ce371b8d2bdfaa7a57764c6f9d8c6b6f28f760a39987a3b54361028083bebb036a5eeb8200d66b927a00b96ef5f7edb6c098aa360379961e9c09000000f74f30ba957bb0de0e48dcccaf817e24fa560e5ef10b8fb65a8b9ee1bc28aa629589cbe02399c38d43549315740955db44018157918b5c0de976cb48decc95988d44282b6a0799cb1479d97cced01facc8e009177beb0db7aee6b727070eb0c0f6b01c8409e4d01a0209d784353f163205000000000000008238920b0a6a255cf281aed15c3fe4ae0ec761773a3ac35f5177d3574be71707036cc3839e0000006bb5932a8969669489311bea30877d0778a9a75bacc84815e24d2aef218904cae20e7f78ee5165bf255b2a7f8b0232cc657daa16041528f28973e3e02aed0a6a58dcdb0ed98c7e5f0cd653351e55ac346579527ffe53ac80055bd8db7ef8d03889dc01612fa368f52455c7bf6af9ff5fd16270bceadf5a00"/621]], @ANYRESOCT=r4], 0x1f) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000fc0)="31d96da88b0cce5062747ce237ca24f05b05df66b34814c1cdb2db3642a7c880224c03d6cffd67b36c7f1a51ae9aeaa3892b040ba2105d77d4e4579d745ad601f19c26d1260bcd5435ae4ad35d123f7e809a7b0576431fde9f78c3260a3837b52ef6437c404147add96c92a9d3a67dcf93c198c3b7727cd266c20c5e584c28ae0843064b8f7f199db8641f71a407775e0090bbedee63a4640e1f012e5ca95bd14b5aa0da642b552ae4aa2b869458dec283c16f25c67068fc528a793f75c81acac8ee6596d79c449ade5eeee332c460ebc0d46c076e871b6426d521c571a95d0fa800de30a110e719ffde8f103773daaaec8c313aa3be0bdaa6e7e796df3975a8e37aee6d10579f8afe6552f187c262b32eced8b5f01e40ab8904400f00000000000000000000000000000058b4721949da012002cb7f4ac8fe195cd5256a09e8cd45020083b0089b23f86603321faf83e794bea1ece8051e9996306347bd562aa2437fa6bdb57086302926b8af069b8d331ebf5c0e1a7f163e6d711af330efdfae413fafef9acf1d53e6aaf4f2dec9ddfb4ca321583e35a14a92e82bdbea3c127a033b32059fbadce23a3e87957f8238886aa9380000000018888c4c20ba104342e8c9d85a9dcf06abbb7a2905d37839bff6f8641ebce172c60a8d368cd4a94af484749dc4ccdd380bbf5d501302d50e79d3536eab5a12abdd347dac985c4349ec712661df947315514e45a515417e6b00000000000000002bdacdb2631c83a90dbca3aa7e5936f8aa413a75c7780309e1c178bce65ed205154ab4f55241cd2b6e83b29fc6cefe050d7d562360718e25bbdb2d34264d6a741cbbed50422f5d") r7 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_int(r7, 0x29, 0xcb, &(0x7f0000000180)=0x100000001, 0x30a) preadv(r2, &(0x7f00000005c0)=[{&(0x7f0000000500)=""/40, 0x28}, {&(0x7f0000000700)=""/242, 0xf2}, {&(0x7f0000000c80)=""/221, 0xdd}], 0x3, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0xffffffffffffffff, 0x10000}, 0x20) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setownex(r7, 0xf, &(0x7f0000000580)={0x0, r8}) sysfs$3(0x3) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000100)={'h:\x8d\x00\x00\x12\x03\x95x\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000400), &(0x7f00000001c0)=0xc) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) fcntl$setownex(r5, 0xf, &(0x7f0000000980)={0x0, r4}) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r9, &(0x7f00000000c0)=0x202, 0xdd) 12:25:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\'', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000040)=0x4c000ffb, 0x10a000d04) 12:25:44 executing program 0: setreuid(0x0, 0xee00) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_proto_private(r0, 0x89e0, 0x0) 12:25:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\'', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000040)=0x4c000ffb, 0x10a000d04) 12:25:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000000)) 12:25:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc1105511, &(0x7f0000000100)={{0x4, 0x0, 0x0, 0x0, 'syz0\x00'}}) 12:25:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x8c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:44 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:45 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000000)) 12:25:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x8c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\'', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000040)=0x4c000ffb, 0x10a000d04) 12:25:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc1105511, &(0x7f0000000100)={{0x4, 0x0, 0x0, 0x0, 'syz0\x00'}}) 12:25:45 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000000)) 12:25:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x8c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 12:25:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\'', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) sendfile(r4, r4, &(0x7f0000000040)=0x4c000ffb, 0x10a000d04) 12:25:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc1105511, &(0x7f0000000100)={{0x4, 0x0, 0x0, 0x0, 'syz0\x00'}}) 12:25:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, 0x0, &(0x7f0000000000)) 12:25:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x8c}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1014.743036][ C1] net_ratelimit: 18 callbacks suppressed [ 1014.743046][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1014.754742][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:46 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:46 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc1105511, &(0x7f0000000100)={{0x4, 0x0, 0x0, 0x0, 'syz0\x00'}}) 12:25:46 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:46 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:46 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:46 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:46 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:47 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) [ 1015.943107][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1015.948996][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1016.023053][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1016.029006][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:47 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:47 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:47 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:47 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:47 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:47 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:47 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffc6}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 12:25:47 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffc6}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 12:25:47 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0205649, &(0x7f0000000040)={0xff000000}) [ 1016.743046][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1016.748926][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1016.754920][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1016.760745][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:47 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:48 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) bind$alg(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x13e) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="18c18377381651f43423f454975709e40902000000cd"], 0x1}}, 0x0) sendto$inet(r1, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) socket$kcm(0x10, 0x2, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@txtime={{0x14, 0x1, 0x2}}], 0x14}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, &(0x7f0000000040)) 12:25:48 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 12:25:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x903a, 0x0) readv(r2, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/26, 0x3}], 0x100000000000025c) write$FUSE_DIRENT(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="b5"], 0x1) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r1) tkill(r4, 0x1000000000016) 12:25:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffc6}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 12:25:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000380)={0x7b, 0x0, [0x11, 0x0, 0xc0010015, 0x200], [0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) 12:25:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="100000000400"/16, 0x10}]) 12:25:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000380)={0x0, 0x2, 0x2080, {}, [], "dc1f835cbdeeef44bf9093d6e7adab40545a3e2c64af00b7e24e71d5a16d13383004d06da3ab72ebd17104993ce48a9a78e7cb6b76cbce86c685aedfd40af43e36e2fdd24bb3d12782c40d769aad3b1c5c11b4241e915665e774e1d492aabc4c3fe340a402aea770f09752990f456c4890e94599cc4eab3976b423e3abdc36d23bfcbc7ee20b7dd03e81983d21436c68a1dedf77ee08a734bf0fca8e1523345ae9c00dcf7568a3e99ab32b6e0157de0c512d85bbf4159fd559c23c51f8d4a313cb893da475b5a7eff178397274c6b894c26ceaf65ed2466f2b2375fceb1f04719d30f3f220a8ae10b88ae2cd0b0bf3892707a110b67196159aee1170e8f24542af65c56a66561a829407fa3f84216d94b3e4125fa813e84a48b8ed35f164d01b212802ffb9421a7c15512ffacc8e3d34afa4d4121f42b0be6380c053037dfc6530e3c3253efe1afa88ca019fc915c7f9b0dadc221a626718a8e050aa1d84cd18df8fbf851ef7b94e2b24b06c05dd0bf4f4209fc660219efcd19f2e53db842aef9d7c32259e6252260dcb7674029d3163ca6f69439605ac635628a84f2e2f3627930dd01419bd7d8091ed58e495d2bd6b5cf331e218ed6feae3062704c5ad78ecdb8f0e72a5976d68d77a17f65590f83da757b87a3853b6a134122ee8d049b31f72b5274ff83748276027bad41fc298907e465930d868ab399b682cfe50171cc2ab48415bb82c1752fa82887fc3c6c420bbfe30bee2094c1a080ddc0661482e08ea4b761a52fb9d663ff9af4e9da8d87415760feba94a916b49cad88132a27ddd2a256aeb9266073b7b4224767724f1c49cc28776279878eaddc7cb02f0695ea41834369a1109a627a93bb73858c9c421721ebc24351faf9c9d9cf951d919153bf8c58d4372d20c706dd5396b38651fa2d768e7a9f06ce919abbcaa4b7ef7db6745c742b4f7682c2e28649f43fc694b93394832eea56f2265f473c1ea8e511efd4e9d983391bf5d6082369f374932f609d52029dbc050d1e41cfa5dc2d38b63333a63d59b85b624f423cc50502b3db255fd522c16579f6b07372bb5cff8531d82508c15cf997b5146ecc6d62e562f236eef310335715702711537d3815467d98faaf9a3a5738af93d93428050cd19dcf175d442d5ec996ac889b4f59b6ea21a76a408682f94585b49f62c98e38d252ba5e4cb35205d287ba12a8db30c68bc66a02a612deecd421a0cf1d80650245efe12882a93dfadf954efdf9671a99c29e4e549751d7666509cc5edcc97c5e0174ec5e0cdd8ac85229070f12e293ce835cb4f859a8e26a70b6672e3ac5b746146f08c4121ea5d175e81d50f780fbdc7ca822b22f9ce50e65fbe4e89a5dfc7c79946121dee63f85530bb2f00b18a7abb732293850846c73e1376dfaf936f605f05ee2da3a3a76ca031197a1dcc1c7e7f61644662cd6746d3d51ffdf58f0f4ba1b6be7975816f2ebc0966354c13cb9cdcce1bfefefea3a9cddebfd9eb2c2e29124ca481e66273dcf8292c2d50c12a509a81394fa69c233a0d34c1cbef4489155e063298bcfe3940984091f6b1232ae9fba9e8d7ed2627ed4d757b7624b30d77d22cdd229f5a1f0ff81a5d2319cedf68985267e85eff44e6da4a5f93e88fe50f51759df95b5961c7c0f7bbe68fc54eca685df478ea4bb96a138d5d0cb215a4a061dafa67120d11b6be1ff6443aafaf4cdebfea09c078bcfb67bd862b11c6b068868bebf549df1d037095fb5beb83f7b9e1ddd53ed8aa31d5cb61a029043a1cc2e0db16f9fc6db13733282c219c5adeed573a6c34f5e5579ed5cd6042dfbd0f18e8caf59d8e94bb0cb6f63a1470b67a9d9dc0b30d160eb500ed1a69e96beb4a15ced2d8f11f27da64fa9fc3dcd448ef01b5757fdee5bcfef8921c1e50faa111568d4dd636a1d3b37bda783cf8f7a51481697b888224d2cdd2bcea867ebd885281181e18d708f15c98454fe690aef83461deacbc871b42ff9399f158f065991fac827544dcbda1d531804513e847de2b53b16beb4102c389f61f1b41b21228a9dbf09402d9441f6b16928e2f889966210d5cc87a24c93ffbdef8d82ce81c41ffd4abdcd27333545769f5bbac66c2836f4d916b70356a675584530c5ae8278349d7d12fa3b60bb057b7f75cd191572e7705f8ac2b9c948a9359439a9a10cef8cf3f3448c7ae55e0426efd57a36fbaee7ad6e36af617975de5a26c7445c4ba4f7e4237e3d3d0fc7a070a31a9496a9af5660689f0665df965ef1878707f736f43a84e06a3a223828c299e2aac973c1c162090b8f1933903081a8650fa75318806f0b53828f5fe0493008adb2320d29289242e50331d16d5ac9a29770428d1bddc2146ae832da3ea8f1ef8bcc61fa9b28fe9b92dbbc4ea79e1dce2664111032dd1f3895ae304a7403b042136b112f3d53c11a485d86bf0ff6b0db88b0d05543ba7ddf43939ea1a7ee84ff3f955fb45b6fca9982712c43073783a31b4544f95f6a793c1c22e64cc8fcc2f167c0ff2eaae764eb235c5a78d01c51b6a44556884a6fcced8dff2133da9a540517939ded4c07e44adff1f51872611dca92c8483b4366b570062ce6040f7b460563867d03048b1095f200c21ab7b2e4fd26cd1d34ea4b7b847e29fea63caab9d2240a5921bcd4e31008973d89808da2bff6c8bee76f92c2f085bad8f22cdbf15d07c8b0fe5e802a38d76eb360c0cba94eda5450d8bbedd9ef30128253d3eaf1194c93ae1fd1aacded7bb2e62125fe887b114db161a4ac4e5760604f166be2c5cb65aa23908a841535c05e26628790d0dc10cbc30d07c27bd29c39db074e15b045208719eb44c6f08bca0f6c0065c7e7be9e5514661dfd5a92b0d6bef82d248aabb77c73d977321fa442cad70669018c24f31bdc2041358513e46389eebad6cdbadf974dd02ebc8092ba05a16dc7da4843929a521fb15bf52f08ad29385db7e7bd165d9ea4538a5b8e86cd304caa84c38b4629350f7b49189da8fc3c22d5cd2e6462e3e622a7c1bbcb0f30d3c7eed5d05e0bddab561139c8e654950222d784b4829570ffaa9657303127352c5267fb3628145c150c9356745db7149bc328614c4c597efafa88125e427e467851ea32dc88a0548ae5040c3fbe57b5e51e49f8987b25dac1732316a559d689a3df56fd8b3adb1d0d4c20e99f78b84fbe16bbc7998e9e52c8fc259a0560e5de1b485207c857b5731435b916eb6b73fcd99ab957b7638af05fbf8f0c88fd6e7d2566963ae2a10fc88ca6a6867ab55283055b0a2943af80144b1974124fdd617b2289e57bb2567bbfec819aac8bc43648b7495c5cc987e8e25ebd8f7bf5879034e0306fe16b02f26b46ee0eccb677a17d09f9396d762b4c4547eff6e0243bf9f3751c4f3773c2b9c97c309274bf49ca2064be5242eae7e199baf76e0584a8d849bd7493f55f575addac33114bd7465e1d392bcdbe0099ae915f2987a3fc765e792f43861d5e631976a3e545f3a6cc6c7ceca50ca4050092f98647b9f71c3845953f659beca89f33e4b23105f6173b14af8bc0bb585a82f38c0b6bcc4b2276d77ba07ee2551673d2ff2b84e9ff7935736821ef23532114eb6382e5d086f4571e5a1e0f9931d2c8b13c52045bcd63f96dbd9391495bf6485b2369073abbbc3b0378f59cebdb05647b531142dbfff4ec074c72609fa5b0d2dd95ab31589b3845c392592d11441b57ecfd487caada0ea66e5f2d1d54ea8d127f6634be102e710932887372fac5927947286599157bf4189f73e23ff31ce25369f7a9aaed1307694f6b9e3c88aa867d8233b96c4353348d45f1720b3c7bb265a4e9720fcd6cca5e038e69e3b0913956c2e390da72904195629aac0500a471c156ffa95ba701cea60d3034db8adcf200de3e5f977182dd60dd57b806fa507f4e00239f489836274e603101f3cbf1706eef18889ec230a8d98b634ed8e02ea17ff2cdf9a3973831f77bfbba1c220fdbc169764896e200355c0cf36857f821ad08a382af851b01174a83018cea8ec486d155586f89f0ca24648ab18fa164856993b7344f36ece150daca1284d47867fd6645f1cb644833f6ac42ad2d0284c8a796483cbcd77933d77d2383b5c348379b8ceb0c1ceb348ad3c38c47d37dac4e75128d9241e9ab65496583c1fdd7aba5636e135679344778e73db206a4ea8942326f6fe0e138e838eac4c23621e1fca78ea4c0ebd780cc73e47bdb1d77a34126bc859c0ac387ba96cc3b98d7b6eb3c84773b9ad3303bc0664b88d661ee871e65c4d3aa9935bd9d062bb5ba8adc5c0c49a7ca1bbc66a0846f8c755ba96ccfa1cc9b2f003e420042beb6f752bab6c4f64e81bae696a33fa73e04ae746890b6c027106ecaefbe028dfe488af13c690444a0b0e0ed65b3a57b323c2bfa0ed24842d9578a6d60c43bd513310be03b3072067b093c92e2c929366626d432fc01b827a97ce8d9c8d7abeb4c9b04f650acb644579168d2aa410894ed2d352ab714ff1f4e7fe6b0541347a6f0c5e74c81e4cf58a1b2e075aee51dd9a05140a206229d7d5c884103be87d1cf7fceaad00b23b62e94aa1f6cb85d9c12e6ef4923ff4386dc89ba0e1b05a9f7bf4d7d16f44e907268d3a003be01a3e903aebf6baf8b07aa082ed7d123347e1d5ed7cf9af474ae7731a4e3471764057910c19371b73c9608d7cebf5cb39dbc241d5ecd8ff3c58d1d50eb135e029118b4a0844419920ecfc769780fe8ba8fe25a3175e401eea9342b93b237fead1a873f856b6f15d2a9436364b3fec1048cae4beb9270ac5cfbf2ae39b34846a2f5ff867c7dfcbc6f2f141090a7eafc0a8c966061785da2cffd0823c8036ae65f226fb9ac2098a8086eb8a4e7f16034eb822f5c19bc27a036b791a3c3a61fd54f2fde0401cb6550a8dc334954c2457a14c4e5c20f3a7b1b6336daaaf57ac2ce32cf12c015c61c0157fd1da88ed63af25c198fd6cfea6402ccd9b28bbe6806a50a27e0ee828311096ed7cc3cb0ddf63d95ffeb4f4e4d14333d9d52b35f6b9ceb27ac68c58636157191995f37c964044338089cedb1fb9655a7e92e82a0566380489b1e8897f1ca98ad7b68ce441d70bf68c628c35b7cbfecf148e9fc4be0a3aabbeabbb2c07d0eca73cd3042815895e297d2d82435b12129a0bf055fad0c8e0a7d7b2d32bb7817dc45c9bb946ad4e24874f506323523754f7715e40a5f1262c192bdbc3d9e6626d20b50b3d85ae87225d61d24edb7f4ab99e47172fd55a8d25d9aaf379a9e45d811bf190fd48d2b307d36036bb32742d7459be94e39c46e0ed85cddfe2c28260ebe0774fef2446253ac970a7afe0ca0db125204b36200204f1d9c9d2224b3fd1f9ec9e1d8d1ca3e5ec6f91d6f87df587a6d8b539724de63be6bdc7b1dc4ef9f9db649602ad01fd7bc9099af7e384554e0e58cc55f8ddc6383710b8594bfd4a134ba44eb6ffb0c6a547e85e282cdd61518cee73dfdd1a1e4112eb10caf3c720ae86f6808f2f22b23b1d6df3a081a8a8007f33f124471e774afbd469d5be8f5c922d85636b7dd1e6c594198399f3a9178f81b91c2d70c8f8e22e4e99da9a6c6894d074e36dd4d826efb1d518517edb38268058b4f8c479a82d71f405d4cba59171a8e4337d4d7a14469d6da48fb133d0ef2350da1b74997c561d3633589d821140f3664aff9dee1af5a0954f33e5fa485c8ceab1f98b705bf58b2cef6c4271ea558e3710ab99b5370653a9fcbf93bd0dbad56566b959c77ea139df6d721715334a92339beacfbe723edd330c24d1cff6abb00fd140b204", "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"}) 12:25:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffc6}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 12:25:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="100000000400"/16, 0x10}]) 12:25:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="100000000400"/16, 0x10}]) 12:25:48 executing program 0: socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x2) 12:25:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000340)) 12:25:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="100000000400"/16, 0x10}]) 12:25:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="100000000400"/16, 0x10}]) 12:25:49 executing program 0: socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x2) 12:25:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000340)) 12:25:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="100000000400"/16, 0x10}]) 12:25:49 executing program 0: socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x2) 12:25:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="100000000400"/16, 0x10}]) 12:25:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000340)) 12:25:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000340)) 12:25:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000340)) 12:25:49 executing program 0: socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="f6f7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x2) 12:25:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000340)) 12:25:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f00000002c0)=0xffffffffffff3f30, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000340)) 12:25:50 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x4000001) 12:25:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:50 executing program 4: r0 = socket(0x200001000000011, 0x4000000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) write$binfmt_script(r2, &(0x7f0000000280)={'#! ', '.', [], 0xa, "67f0ee7d0c6c070806"}, 0xe) 12:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:50 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x4000001) 12:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:50 executing program 4: r0 = socket(0x200001000000011, 0x4000000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) write$binfmt_script(r2, &(0x7f0000000280)={'#! ', '.', [], 0xa, "67f0ee7d0c6c070806"}, 0xe) 12:25:50 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x4000001) 12:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 12:25:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:50 executing program 4: r0 = socket(0x200001000000011, 0x4000000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) write$binfmt_script(r2, &(0x7f0000000280)={'#! ', '.', [], 0xa, "67f0ee7d0c6c070806"}, 0xe) 12:25:50 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:50 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x4000001) 12:25:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 4: r0 = socket(0x200001000000011, 0x4000000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) write$binfmt_script(r2, &(0x7f0000000280)={'#! ', '.', [], 0xa, "67f0ee7d0c6c070806"}, 0xe) 12:25:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 1020.103011][ C0] net_ratelimit: 12 callbacks suppressed [ 1020.103021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.115069][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:25:51 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 1020.183021][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.188984][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:51 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:51 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 1020.903034][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.909023][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1020.915014][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.920827][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 12:25:52 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 1020.983073][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1020.989255][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:25:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0xc0045878, 0x0) 12:25:52 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x300004) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000140)='ecryptfs\x00') mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) 12:25:52 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:52 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 12:25:52 executing program 4: clock_adjtime(0x0, &(0x7f0000000280)={0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe92}) 12:25:52 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 12:25:52 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) prlimit64(r0, 0xf, &(0x7f0000000140)={0x9, 0x3ff}, &(0x7f0000000180)) recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/231, 0xe7}}], 0x1, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x8000) socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000600)=""/197) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) write$binfmt_aout(r1, &(0x7f0000000700)={{0x108, 0x0, 0x1218, 0x338, 0x31c, 0x4, 0x0, 0x7}, "0b0e5a1da81d27db722d49ef84fa377aacae680261dd8c62e5e6b5da161d58d1515645b95b4e68fd5862408f5863b4a3b1471914f1d947c66e3fd5c95addae8b4c8c1511b777540638f68599aa9cddae7dbd2dd5f17fef79d4f8d4cef35d8ae28de7fef190d0787edd92af5c942b25435cee2bdd0035833782d50be3ddf8f7fed6f24bc52d39f80972faf7529853e4808bec2058986725a270e0dd9a9a2e5cd9a72cf86dba6cfbe424ff7eedadcde59ef1a990e09ae2fb75092da739f3714655247817d2daca7fb6c62ea0c6a148", [[], [], []]}, 0x3ee) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="6a4e49d755d6ff67799f2dbac9c838cbe2be4bfa379637dc84613619d162a787857f3b5db5dd1a88ee4f3bcd1d816d92979d95a515a8c4edd7cba520979a6a999571fcf11a3b6fb56ed3379152b81823719163759deca17bdfdf682378894ec7d4ca9e63231229d3e0cb3bc7dfcbdede99e597cb54fcc435f6e868f30c7214565ac0") read(r2, &(0x7f0000009f9c)=""/100, 0x64) 14:30:12 executing program 4: clock_adjtime(0x0, &(0x7f0000000280)={0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe92}) 14:30:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0xc0045878, 0x0) 14:30:12 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) 15:32:22 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000007c0)='\xaf\xf1\\\xe4\b\x18\x17D\xb2\xc7\xda\x00\x00\x00\x00\x00\x00b\xc1\xcd\xaa\x9epG\xab5\xeb\xa9\x84A2\xd8\x97\xe7.\xae\xf2\xd41\xc6\x86\x9c\xf0\xb9\xbe\xca=\\I\xeb\xfa\xb6dC\xd4{\x97r\xd4\x1a\xdf\x16\x83\x95\x17\x14E\xc5C}\xfb\x8aU)1\x1e\xa5\xa0\x956\xca\xb4(t\x98\xd5;<\rD\\\xef\x84\xf7\xb4\xdd\xb0\xc5\x02\xfb~l\x9f\r\xc4\x86\x1d\xdd\xad\xc5P8\xb5\xa8\xd0\x19\xac\x06\x97\x81\xad%\xefzX\"\xde#\x1ew+-V\xe9/\xda1\xfarA\xbf~F\xa9\x01\xd4\x12gc\xbd)\xf4j\x02\x1a<\xc7\x04\xddy\xb0\xc4\x84\x1a\xa6`\x9c\x03&\xc7ioj\x14\xd9\x84\xc1\xeb\xb1k\xeb\xe2\xf3r@\xe4_\x0e\x97\xb8\xf2a\x7f\xa0w&\xb3\xa1\xc4\xd0g!Q0\xb0\x90.\xa43\xd7\x16\x06P|\xc9*\rs\x7f\x0f\xe4\xeb\x1b\xa4\x84\xa8\x19&\x94\xf1\a\xd0\xe6Q\xf1:mo$\xb0M\x85\xc1cW[V\xed', 0xf8, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2a482) write$binfmt_script(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="5bae58ee83f5e355dfce654be9646b7fe0174b6368e1d90e5b7120199347c9ed2505ccc46c4a89887a75c125d19cbf1e16db7a0000000040aaec6425d38aed9ccb1f32fbbf94fd4c1ef14b5d1099cb13e8af458405c3612ae708dac76d59790438bc22ac4a714a9303e39c295dea303fa50f8684bcc88df727859bbb277fa711432a85e13afb9be06723f51934988628fb595fddd1135ada6f5ab3a8bf93b46f1f67603a3ddf392a12e0dce2e20b4aa5bd78f9fe1a"], 0xb5) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f0000000240), 0x20000102000007) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x8000000000044000) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 1021.535068][ T708] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 15:32:22 executing program 4: clock_adjtime(0x0, &(0x7f0000000280)={0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe92}) [ 1021.707206][ T716] [ 1021.709606][ T716] ===================================================== [ 1021.713960][ T708] kobject: 'phy19' (000000006af5f68e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim18/ieee80211/phy19' [ 1021.716546][ T716] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 1021.716560][ T716] 5.2.0-rc5-next-20190619 #18 Not tainted [ 1021.716565][ T716] ----------------------------------------------------- [ 1021.716584][ T716] syz-executor.3/716 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 1021.716592][ T716] 000000007e960cc9 (&ctx->fault_pending_wqh){+.+.}, at: userfaultfd_read+0x540/0x1940 [ 1021.769713][ T716] [ 1021.769713][ T716] and this task is already holding: [ 1021.777180][ T716] 000000008a6daafb (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 1021.785798][ T716] which would create a new lock dependency: [ 1021.791690][ T716] (&ctx->fd_wqh){....} -> (&ctx->fault_pending_wqh){+.+.} [ 1021.798995][ T716] [ 1021.798995][ T716] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 1021.808447][ T716] (&(&ctx->ctx_lock)->rlock){..-.} [ 1021.808463][ T716] [ 1021.808463][ T716] ... which became SOFTIRQ-irq-safe at: [ 1021.821384][ T716] lock_acquire+0x16f/0x3f0 [ 1021.826193][ T716] _raw_spin_lock_irq+0x60/0x80 [ 1021.831141][ T716] free_ioctx_users+0x2d/0x490 [ 1021.835999][ T716] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 1021.842329][ T716] rcu_core+0xba5/0x1500 [ 1021.846719][ T716] __do_softirq+0x25c/0x94c [ 1021.851323][ T716] run_ksoftirqd+0x8e/0x110 [ 1021.855918][ T716] smpboot_thread_fn+0x6a3/0xa30 [ 1021.860947][ T716] kthread+0x354/0x420 [ 1021.865108][ T716] ret_from_fork+0x24/0x30 [ 1021.869617][ T716] [ 1021.869617][ T716] to a SOFTIRQ-irq-unsafe lock: [ 1021.876631][ T716] (&ctx->fault_pending_wqh){+.+.} [ 1021.876646][ T716] [ 1021.876646][ T716] ... which became SOFTIRQ-irq-unsafe at: [ 1021.891059][ T716] ... [ 1021.891090][ T716] lock_acquire+0x16f/0x3f0 [ 1021.898276][ T716] _raw_spin_lock+0x2f/0x40 [ 1021.902871][ T716] userfaultfd_release+0x4ca/0x710 [ 1021.908117][ T716] __fput+0x2ff/0x890 [ 1021.912199][ T716] ____fput+0x16/0x20 [ 1021.916270][ T716] task_work_run+0x145/0x1c0 [ 1021.920950][ T716] exit_to_usermode_loop+0x273/0x2c0 [ 1021.926324][ T716] do_syscall_64+0x58e/0x680 [ 1021.931012][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1021.936997][ T716] [ 1021.936997][ T716] other info that might help us debug this: [ 1021.936997][ T716] [ 1021.947225][ T716] Chain exists of: [ 1021.947225][ T716] &(&ctx->ctx_lock)->rlock --> &ctx->fd_wqh --> &ctx->fault_pending_wqh [ 1021.947225][ T716] [ 1021.961471][ T716] Possible interrupt unsafe locking scenario: [ 1021.961471][ T716] [ 1021.969819][ T716] CPU0 CPU1 [ 1021.975184][ T716] ---- ---- [ 1021.980540][ T716] lock(&ctx->fault_pending_wqh); [ 1021.985657][ T716] local_irq_disable(); [ 1021.992440][ T716] lock(&(&ctx->ctx_lock)->rlock); [ 1022.000432][ T716] lock(&ctx->fd_wqh); [ 1022.007116][ T716] [ 1022.010582][ T716] lock(&(&ctx->ctx_lock)->rlock); [ 1022.015953][ T716] [ 1022.015953][ T716] *** DEADLOCK *** [ 1022.015953][ T716] [ 1022.024114][ T716] 1 lock held by syz-executor.3/716: [ 1022.029477][ T716] #0: 000000008a6daafb (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 1022.038538][ T716] [ 1022.038538][ T716] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 1022.048959][ T716] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 1022.054603][ T716] IN-SOFTIRQ-W at: [ 1022.058787][ T716] lock_acquire+0x16f/0x3f0 [ 1022.065231][ T716] _raw_spin_lock_irq+0x60/0x80 [ 1022.072100][ T716] free_ioctx_users+0x2d/0x490 [ 1022.078722][ T716] percpu_ref_switch_to_atomic_rcu+0x4c0/0x570 [ 1022.086734][ T716] rcu_core+0xba5/0x1500 [ 1022.093372][ T716] __do_softirq+0x25c/0x94c [ 1022.099740][ T716] run_ksoftirqd+0x8e/0x110 [ 1022.106098][ T716] smpboot_thread_fn+0x6a3/0xa30 [ 1022.113143][ T716] kthread+0x354/0x420 [ 1022.119059][ T716] ret_from_fork+0x24/0x30 [ 1022.125310][ T716] INITIAL USE at: [ 1022.129320][ T716] lock_acquire+0x16f/0x3f0 [ 1022.135582][ T716] _raw_spin_lock_irq+0x60/0x80 [ 1022.142209][ T716] io_submit_one+0xeb5/0x2ef0 [ 1022.148658][ T716] __x64_sys_io_submit+0x1bd/0x570 [ 1022.155529][ T716] do_syscall_64+0xfd/0x680 [ 1022.161789][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.169798][ T716] } [ 1022.172447][ T716] ... key at: [] __key.53594+0x0/0x40 [ 1022.179986][ T716] ... acquired at: [ 1022.184070][ T716] _raw_spin_lock+0x2f/0x40 [ 1022.188752][ T716] io_submit_one+0xefa/0x2ef0 [ 1022.193612][ T716] __x64_sys_io_submit+0x1bd/0x570 [ 1022.198905][ T716] do_syscall_64+0xfd/0x680 [ 1022.203591][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.209666][ T716] [ 1022.212015][ T716] -> (&ctx->fd_wqh){....} { [ 1022.216522][ T716] INITIAL USE at: [ 1022.220515][ T716] lock_acquire+0x16f/0x3f0 [ 1022.226586][ T716] _raw_spin_lock_irqsave+0x95/0xcd [ 1022.233356][ T716] __wake_up_common_lock+0xc7/0x190 [ 1022.240235][ T716] __wake_up+0xe/0x10 [ 1022.245794][ T716] userfaultfd_release+0x528/0x710 [ 1022.252478][ T716] __fput+0x2ff/0x890 [ 1022.258078][ T716] ____fput+0x16/0x20 [ 1022.263635][ T716] task_work_run+0x145/0x1c0 [ 1022.269809][ T716] exit_to_usermode_loop+0x273/0x2c0 [ 1022.276689][ T716] do_syscall_64+0x58e/0x680 [ 1022.282878][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.290421][ T716] } [ 1022.292935][ T716] ... key at: [] __key.46263+0x0/0x40 [ 1022.300477][ T716] ... acquired at: [ 1022.304303][ T716] lock_acquire+0x16f/0x3f0 [ 1022.308987][ T716] _raw_spin_lock+0x2f/0x40 [ 1022.313702][ T716] userfaultfd_read+0x540/0x1940 [ 1022.318826][ T716] __vfs_read+0x8a/0x110 [ 1022.323248][ T716] vfs_read+0x1f0/0x440 [ 1022.327609][ T716] ksys_read+0x14f/0x290 [ 1022.332125][ T716] __x64_sys_read+0x73/0xb0 [ 1022.336814][ T716] do_syscall_64+0xfd/0x680 [ 1022.341505][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.347583][ T716] [ 1022.349917][ T716] [ 1022.349917][ T716] the dependencies between the lock to be acquired [ 1022.349922][ T716] and SOFTIRQ-irq-unsafe lock: [ 1022.363434][ T716] -> (&ctx->fault_pending_wqh){+.+.} { [ 1022.368914][ T716] HARDIRQ-ON-W at: [ 1022.372903][ T716] lock_acquire+0x16f/0x3f0 [ 1022.379152][ T716] _raw_spin_lock+0x2f/0x40 [ 1022.385313][ T716] userfaultfd_release+0x4ca/0x710 [ 1022.392095][ T716] __fput+0x2ff/0x890 [ 1022.397745][ T716] ____fput+0x16/0x20 [ 1022.403378][ T716] task_work_run+0x145/0x1c0 [ 1022.409647][ T716] exit_to_usermode_loop+0x273/0x2c0 [ 1022.416604][ T716] do_syscall_64+0x58e/0x680 [ 1022.422853][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.430390][ T716] SOFTIRQ-ON-W at: [ 1022.434385][ T716] lock_acquire+0x16f/0x3f0 [ 1022.440545][ T716] _raw_spin_lock+0x2f/0x40 [ 1022.446795][ T716] userfaultfd_release+0x4ca/0x710 [ 1022.453573][ T716] __fput+0x2ff/0x890 [ 1022.459305][ T716] ____fput+0x16/0x20 [ 1022.464942][ T716] task_work_run+0x145/0x1c0 [ 1022.471193][ T716] exit_to_usermode_loop+0x273/0x2c0 [ 1022.478145][ T716] do_syscall_64+0x58e/0x680 [ 1022.484395][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.491935][ T716] INITIAL USE at: [ 1022.495839][ T716] lock_acquire+0x16f/0x3f0 [ 1022.501913][ T716] _raw_spin_lock+0x2f/0x40 [ 1022.508084][ T716] userfaultfd_release+0x4ca/0x710 [ 1022.514775][ T716] __fput+0x2ff/0x890 [ 1022.520323][ T716] ____fput+0x16/0x20 [ 1022.525867][ T716] task_work_run+0x145/0x1c0 [ 1022.532028][ T716] exit_to_usermode_loop+0x273/0x2c0 [ 1022.538887][ T716] do_syscall_64+0x58e/0x680 [ 1022.545047][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.552495][ T716] } [ 1022.555009][ T716] ... key at: [] __key.46260+0x0/0x40 [ 1022.562455][ T716] ... acquired at: [ 1022.566285][ T716] lock_acquire+0x16f/0x3f0 [ 1022.570960][ T716] _raw_spin_lock+0x2f/0x40 [ 1022.575637][ T716] userfaultfd_read+0x540/0x1940 [ 1022.580757][ T716] __vfs_read+0x8a/0x110 [ 1022.585212][ T716] vfs_read+0x1f0/0x440 [ 1022.589535][ T716] ksys_read+0x14f/0x290 [ 1022.593945][ T716] __x64_sys_read+0x73/0xb0 [ 1022.598629][ T716] do_syscall_64+0xfd/0x680 [ 1022.603320][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.609372][ T716] [ 1022.611703][ T716] [ 1022.611703][ T716] stack backtrace: [ 1022.617614][ T716] CPU: 0 PID: 716 Comm: syz-executor.3 Not tainted 5.2.0-rc5-next-20190619 #18 [ 1022.626541][ T716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1022.636614][ T716] Call Trace: [ 1022.639991][ T716] dump_stack+0x172/0x1f0 [ 1022.644342][ T716] check_irq_usage.cold+0x5b4/0x72e [ 1022.649554][ T716] ? check_usage_forwards+0x330/0x330 [ 1022.654945][ T716] ? perf_trace_lock+0xeb/0x4c0 [ 1022.659826][ T716] ? check_path+0x26/0x40 [ 1022.664180][ T716] ? check_noncircular+0x132/0x3a0 [ 1022.669302][ T716] ? print_circular_bug+0x200/0x200 [ 1022.674519][ T716] ? __lockdep_free_key_range+0x120/0x120 [ 1022.680264][ T716] ? is_dynamic_key+0x1c0/0x1c0 [ 1022.685129][ T716] ? __lockdep_reset_lock+0x450/0x450 [ 1022.690614][ T716] __lock_acquire+0x2430/0x4af0 [ 1022.695496][ T716] ? __lock_acquire+0x2430/0x4af0 [ 1022.709838][ T716] ? __lockdep_free_key_range+0x120/0x120 [ 1022.715616][ T716] ? set_pte_at+0xcc/0x130 [ 1022.720091][ T716] ? mark_held_locks+0xf0/0xf0 [ 1022.724971][ T716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.731425][ T716] lock_acquire+0x16f/0x3f0 [ 1022.736034][ T716] ? userfaultfd_read+0x540/0x1940 [ 1022.741172][ T716] _raw_spin_lock+0x2f/0x40 [ 1022.745689][ T716] ? userfaultfd_read+0x540/0x1940 [ 1022.750811][ T716] userfaultfd_read+0x540/0x1940 [ 1022.755759][ T716] ? __fget+0x35d/0x560 [ 1022.759932][ T716] ? userfaultfd_event_wait_completion+0xa90/0xa90 [ 1022.766454][ T716] ? fsnotify_first_mark+0x210/0x210 [ 1022.771749][ T716] ? __fget+0x384/0x560 [ 1022.775913][ T716] ? wake_up_q+0xf0/0xf0 [ 1022.780166][ T716] ? security_file_permission+0x8f/0x380 [ 1022.785815][ T716] __vfs_read+0x8a/0x110 [ 1022.790064][ T716] ? userfaultfd_event_wait_completion+0xa90/0xa90 [ 1022.796599][ T716] vfs_read+0x1f0/0x440 [ 1022.800768][ T716] ksys_read+0x14f/0x290 [ 1022.805030][ T716] ? kernel_write+0x120/0x120 [ 1022.809724][ T716] ? do_syscall_64+0x26/0x680 [ 1022.814420][ T716] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.820512][ T716] ? do_syscall_64+0x26/0x680 [ 1022.825209][ T716] __x64_sys_read+0x73/0xb0 [ 1022.829742][ T716] do_syscall_64+0xfd/0x680 [ 1022.834261][ T716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.840171][ T716] RIP: 0033:0x4592c9 [ 1022.844075][ T716] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1022.863697][ T716] RSP: 002b:00007f8a55ca0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1022.872156][ T716] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 1022.880338][ T716] RDX: 0000000000000064 RSI: 0000000020009f9c RDI: 0000000000000006 [ 1022.888327][ T716] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1022.896406][ T716] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a55ca16d4 [ 1022.904397][ T716] R13: 00000000004c53aa R14: 00000000004db138 R15: 00000000ffffffff 16:34:34 executing program 4: clock_adjtime(0x0, &(0x7f0000000280)={0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe92}) [ 1022.932048][ T708] kobject: 'rfkill15' (00000000eb2bf00e): kobject_add_internal: parent: 'phy19', set: 'devices' [ 1022.953485][ T708] kobject: 'rfkill15' (00000000eb2bf00e): kobject_uevent_env [ 1022.961750][ T708] kobject: 'rfkill15' (00000000eb2bf00e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim18/ieee80211/phy19/rfkill15' 17:36:44 executing program 2: keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f0000000140)="8a3c2a50e59efb", 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x4, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1023.009619][ T708] ieee80211 phy19: Selected rate control algorithm 'minstrel_ht' [ 1023.028688][ T708] kobject: 'net' (00000000b360cd46): kobject_add_internal: parent: 'hwsim18', set: '(null)' [ 1023.040568][ T708] kobject: 'wlan1' (0000000039456afc): kobject_add_internal: parent: 'net', set: 'devices' [ 1023.052066][ T708] kobject: 'wlan1' (0000000039456afc): kobject_uevent_env 17:36:44 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000a600000fe0200000000080008001e000400ff7e", 0x24}], 0x1}, 0x0) 17:36:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0xc0045878, 0x0) 17:36:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getlink={0x28, 0x12, 0x3cb108c337f274d1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}]}, 0x28}}, 0x0) [ 1023.079184][ T708] kobject: 'wlan1' (0000000039456afc): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim18/net/wlan1' [ 1023.110721][ T708] kobject: 'queues' (0000000008c0058f): kobject_add_internal: parent: 'wlan1', set: '' [ 1023.149942][ T708] kobject: 'queues' (0000000008c0058f): kobject_uevent_env [ 1023.157745][ T708] kobject: 'queues' (0000000008c0058f): kobject_uevent_env: filter function caused the event to drop! [ 1023.173242][ T708] kobject: 'rx-0' (0000000000ec4aa4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.183919][ T708] kobject: 'rx-0' (0000000000ec4aa4): kobject_uevent_env [ 1023.191307][ T708] kobject: 'rx-0' (0000000000ec4aa4): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim18/net/wlan1/queues/rx-0' [ 1023.213609][ T708] kobject: 'tx-0' (0000000038034ce0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.236609][ T708] kobject: 'tx-0' (0000000038034ce0): kobject_uevent_env [ 1023.244098][ T708] kobject: 'tx-0' (0000000038034ce0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim18/net/wlan1/queues/tx-0' [ 1023.257551][ T708] kobject: 'tx-1' (00000000c906b8eb): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.268112][ T708] kobject: 'tx-1' (00000000c906b8eb): kobject_uevent_env [ 1023.275581][ T708] kobject: 'tx-1' (00000000c906b8eb): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim18/net/wlan1/queues/tx-1' [ 1023.289485][ T708] kobject: 'tx-2' (000000002fe04d33): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.305004][ T708] kobject: 'tx-2' (000000002fe04d33): kobject_uevent_env [ 1023.320034][ T708] kobject: 'tx-2' (000000002fe04d33): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim18/net/wlan1/queues/tx-2' [ 1023.333756][ T708] kobject: 'tx-3' (00000000956b1998): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.344436][ T708] kobject: 'tx-3' (00000000956b1998): kobject_uevent_env [ 1023.351804][ T708] kobject: 'tx-3' (00000000956b1998): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim18/net/wlan1/queues/tx-3' [ 1023.366401][ T708] kobject: 'batman_adv' (00000000fb39b364): kobject_add_internal: parent: 'wlan1', set: '' [ 1023.382983][ T723] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1023.392580][ T723] kobject: 'hwsim19' (00000000c297441e): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1023.415269][ T723] kobject: 'hwsim19' (00000000c297441e): kobject_uevent_env [ 1023.423013][ T723] kobject: 'hwsim19' (00000000c297441e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19' [ 1023.441757][ T723] kobject: 'hwsim19' (00000000c297441e): kobject_uevent_env [ 1023.449713][ T723] kobject: 'hwsim19' (00000000c297441e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19' [ 1023.468354][ T723] kobject: 'ieee80211' (0000000096dccb67): kobject_add_internal: parent: 'hwsim19', set: '(null)' [ 1023.481576][ T723] kobject: 'phy20' (00000000da06198d): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1023.492769][ T723] kobject: 'phy20' (00000000da06198d): kobject_uevent_env [ 1023.500461][ T723] kobject: 'phy20' (00000000da06198d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19/ieee80211/phy20' [ 1023.515144][ T723] kobject: 'rfkill16' (000000003d195c31): kobject_add_internal: parent: 'phy20', set: 'devices' [ 1023.526378][ T723] kobject: 'rfkill16' (000000003d195c31): kobject_uevent_env [ 1023.534249][ T723] kobject: 'rfkill16' (000000003d195c31): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19/ieee80211/phy20/rfkill16' [ 1023.551219][ T723] ieee80211 phy20: Selected rate control algorithm 'minstrel_ht' [ 1023.560674][ T723] kobject: 'net' (0000000014562dad): kobject_add_internal: parent: 'hwsim19', set: '(null)' [ 1023.571243][ T723] kobject: 'wlan2' (00000000137cbf61): kobject_add_internal: parent: 'net', set: 'devices' [ 1023.582810][ T723] kobject: 'wlan2' (00000000137cbf61): kobject_uevent_env [ 1023.590580][ T723] kobject: 'wlan2' (00000000137cbf61): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19/net/wlan2' [ 1023.603351][ T723] kobject: 'queues' (000000009b12cba1): kobject_add_internal: parent: 'wlan2', set: '' [ 1023.614134][ T723] kobject: 'queues' (000000009b12cba1): kobject_uevent_env [ 1023.621416][ T723] kobject: 'queues' (000000009b12cba1): kobject_uevent_env: filter function caused the event to drop! [ 1023.632491][ T723] kobject: 'rx-0' (00000000dc244156): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.642752][ T723] kobject: 'rx-0' (00000000dc244156): kobject_uevent_env [ 1023.649920][ T723] kobject: 'rx-0' (00000000dc244156): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19/net/wlan2/queues/rx-0' [ 1023.663115][ T723] kobject: 'tx-0' (0000000004a4ff6d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.673403][ T723] kobject: 'tx-0' (0000000004a4ff6d): kobject_uevent_env [ 1023.680660][ T723] kobject: 'tx-0' (0000000004a4ff6d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19/net/wlan2/queues/tx-0' [ 1023.693793][ T723] kobject: 'tx-1' (00000000b0ca21cc): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.704551][ T723] kobject: 'tx-1' (00000000b0ca21cc): kobject_uevent_env [ 1023.711629][ T723] kobject: 'tx-1' (00000000b0ca21cc): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19/net/wlan2/queues/tx-1' [ 1023.724763][ T723] kobject: 'tx-2' (000000008712da5a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1023.735114][ T723] kobject: 'tx-2' (000000008712da5a): kobject_uevent_env [ 1023.742209][ T723] kobject: 'tx-2' (000000008712da5a): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19/net/wlan2/queues/tx-2' [ 1023.756590][ T723] kobject: 'tx-3' (0000000000a00b5c): kobject_add_internal: parent: 'queues', set: 'queues' 17:36:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 17:36:44 executing program 2: keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f0000000140)="8a3c2a50e59efb", 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x4, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:36:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getlink={0x28, 0x12, 0x3cb108c337f274d1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}]}, 0x28}}, 0x0) 17:36:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0xc0045878, 0x0) 17:36:44 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000a600000fe0200000000080008001e000400ff7e", 0x24}], 0x1}, 0x0) 17:36:44 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) prlimit64(r0, 0xf, &(0x7f0000000140)={0x9, 0x3ff}, &(0x7f0000000180)) recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/231, 0xe7}}], 0x1, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x8000) socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000600)=""/197) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) write$binfmt_aout(r1, &(0x7f0000000700)={{0x108, 0x0, 0x1218, 0x338, 0x31c, 0x4, 0x0, 0x7}, "0b0e5a1da81d27db722d49ef84fa377aacae680261dd8c62e5e6b5da161d58d1515645b95b4e68fd5862408f5863b4a3b1471914f1d947c66e3fd5c95addae8b4c8c1511b777540638f68599aa9cddae7dbd2dd5f17fef79d4f8d4cef35d8ae28de7fef190d0787edd92af5c942b25435cee2bdd0035833782d50be3ddf8f7fed6f24bc52d39f80972faf7529853e4808bec2058986725a270e0dd9a9a2e5cd9a72cf86dba6cfbe424ff7eedadcde59ef1a990e09ae2fb75092da739f3714655247817d2daca7fb6c62ea0c6a148", [[], [], []]}, 0x3ee) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="6a4e49d755d6ff67799f2dbac9c838cbe2be4bfa379637dc84613619d162a787857f3b5db5dd1a88ee4f3bcd1d816d92979d95a515a8c4edd7cba520979a6a999571fcf11a3b6fb56ed3379152b81823719163759deca17bdfdf682378894ec7d4ca9e63231229d3e0cb3bc7dfcbdede99e597cb54fcc435f6e868f30c7214565ac0") read(r2, &(0x7f0000009f9c)=""/100, 0x64) [ 1023.766937][ T723] kobject: 'tx-3' (0000000000a00b5c): kobject_uevent_env [ 1023.774065][ T723] kobject: 'tx-3' (0000000000a00b5c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim19/net/wlan2/queues/tx-3' [ 1023.787993][ T723] kobject: 'batman_adv' (000000002d27b2c6): kobject_add_internal: parent: 'wlan2', set: '' 17:36:44 executing program 2: keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f0000000140)="8a3c2a50e59efb", 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x4, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:36:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getlink={0x28, 0x12, 0x3cb108c337f274d1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}]}, 0x28}}, 0x0) 17:36:44 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000a600000fe0200000000080008001e000400ff7e", 0x24}], 0x1}, 0x0) 17:36:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 17:36:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getlink={0x28, 0x12, 0x3cb108c337f274d1, 0x0, 0x0, {}, [@IFLA_NET_NS_PID={0x8}]}, 0x28}}, 0x0) 17:36:45 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000a600000fe0200000000080008001e000400ff7e", 0x24}], 0x1}, 0x0) [ 1023.940755][ T748] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1023.977237][ T748] kobject: 'hwsim20' (0000000061f3b3e4): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1024.030129][ T748] kobject: 'hwsim20' (0000000061f3b3e4): kobject_uevent_env [ 1024.049891][ T748] kobject: 'hwsim20' (0000000061f3b3e4): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20' [ 1024.088028][ T748] kobject: 'hwsim20' (0000000061f3b3e4): kobject_uevent_env [ 1024.101539][ T748] kobject: 'hwsim20' (0000000061f3b3e4): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20' [ 1024.117001][ T748] kobject: 'ieee80211' (000000001a11231b): kobject_add_internal: parent: 'hwsim20', set: '(null)' [ 1024.128760][ T748] kobject: 'phy21' (00000000d991387a): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1024.142072][ T748] kobject: 'phy21' (00000000d991387a): kobject_uevent_env [ 1024.149700][ T748] kobject: 'phy21' (00000000d991387a): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20/ieee80211/phy21' [ 1024.168225][ T748] kobject: 'rfkill17' (00000000a5aa6d47): kobject_add_internal: parent: 'phy21', set: 'devices' [ 1024.179774][ T748] kobject: 'rfkill17' (00000000a5aa6d47): kobject_uevent_env [ 1024.187647][ T748] kobject: 'rfkill17' (00000000a5aa6d47): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20/ieee80211/phy21/rfkill17' [ 1024.208707][ T748] ieee80211 phy21: Selected rate control algorithm 'minstrel_ht' [ 1024.220203][ T748] kobject: 'net' (000000002511cccf): kobject_add_internal: parent: 'hwsim20', set: '(null)' [ 1024.231888][ T748] kobject: 'wlan3' (00000000d998dc63): kobject_add_internal: parent: 'net', set: 'devices' [ 1024.247513][ T748] kobject: 'wlan3' (00000000d998dc63): kobject_uevent_env [ 1024.254982][ T748] kobject: 'wlan3' (00000000d998dc63): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20/net/wlan3' [ 1024.267851][ T748] kobject: 'queues' (000000007871ac34): kobject_add_internal: parent: 'wlan3', set: '' [ 1024.278320][ T748] kobject: 'queues' (000000007871ac34): kobject_uevent_env [ 1024.285731][ T748] kobject: 'queues' (000000007871ac34): kobject_uevent_env: filter function caused the event to drop! [ 1024.296972][ T748] kobject: 'rx-0' (0000000014fae26c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.307929][ T748] kobject: 'rx-0' (0000000014fae26c): kobject_uevent_env [ 1024.315178][ T748] kobject: 'rx-0' (0000000014fae26c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20/net/wlan3/queues/rx-0' [ 1024.329239][ T748] kobject: 'tx-0' (000000003dbf7f2f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.340689][ T748] kobject: 'tx-0' (000000003dbf7f2f): kobject_uevent_env [ 1024.348599][ T748] kobject: 'tx-0' (000000003dbf7f2f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20/net/wlan3/queues/tx-0' [ 1024.363920][ T748] kobject: 'tx-1' (000000006f5921a1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.374910][ T748] kobject: 'tx-1' (000000006f5921a1): kobject_uevent_env [ 1024.382133][ T748] kobject: 'tx-1' (000000006f5921a1): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20/net/wlan3/queues/tx-1' [ 1024.395985][ T748] kobject: 'tx-2' (00000000646b1955): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.406943][ T748] kobject: 'tx-2' (00000000646b1955): kobject_uevent_env [ 1024.414569][ T748] kobject: 'tx-2' (00000000646b1955): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20/net/wlan3/queues/tx-2' [ 1024.428569][ T748] kobject: 'tx-3' (0000000011d8b0d9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.439759][ T748] kobject: 'tx-3' (0000000011d8b0d9): kobject_uevent_env [ 1024.447011][ T748] kobject: 'tx-3' (0000000011d8b0d9): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim20/net/wlan3/queues/tx-3' [ 1024.465655][ T748] kobject: 'batman_adv' (00000000026dbaa3): kobject_add_internal: parent: 'wlan3', set: '' [ 1024.479079][ T758] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 17:36:45 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 17:36:45 executing program 2: keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f0000000140)="8a3c2a50e59efb", 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x4, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:36:45 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 17:36:45 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1024.495082][ T758] kobject: 'hwsim21' (0000000039ec6fbd): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1024.511461][ T758] kobject: 'hwsim21' (0000000039ec6fbd): kobject_uevent_env 17:36:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1024.545283][ T758] kobject: 'hwsim21' (0000000039ec6fbd): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21' [ 1024.595265][ T758] kobject: 'hwsim21' (0000000039ec6fbd): kobject_uevent_env [ 1024.616223][ T758] kobject: 'hwsim21' (0000000039ec6fbd): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21' 17:36:45 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) prlimit64(r0, 0xf, &(0x7f0000000140)={0x9, 0x3ff}, &(0x7f0000000180)) recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/231, 0xe7}}], 0x1, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x8000) socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000600)=""/197) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) write$binfmt_aout(r1, &(0x7f0000000700)={{0x108, 0x0, 0x1218, 0x338, 0x31c, 0x4, 0x0, 0x7}, "0b0e5a1da81d27db722d49ef84fa377aacae680261dd8c62e5e6b5da161d58d1515645b95b4e68fd5862408f5863b4a3b1471914f1d947c66e3fd5c95addae8b4c8c1511b777540638f68599aa9cddae7dbd2dd5f17fef79d4f8d4cef35d8ae28de7fef190d0787edd92af5c942b25435cee2bdd0035833782d50be3ddf8f7fed6f24bc52d39f80972faf7529853e4808bec2058986725a270e0dd9a9a2e5cd9a72cf86dba6cfbe424ff7eedadcde59ef1a990e09ae2fb75092da739f3714655247817d2daca7fb6c62ea0c6a148", [[], [], []]}, 0x3ee) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="6a4e49d755d6ff67799f2dbac9c838cbe2be4bfa379637dc84613619d162a787857f3b5db5dd1a88ee4f3bcd1d816d92979d95a515a8c4edd7cba520979a6a999571fcf11a3b6fb56ed3379152b81823719163759deca17bdfdf682378894ec7d4ca9e63231229d3e0cb3bc7dfcbdede99e597cb54fcc435f6e868f30c7214565ac0") read(r2, &(0x7f0000009f9c)=""/100, 0x64) [ 1024.654836][ T758] kobject: 'ieee80211' (00000000632213b3): kobject_add_internal: parent: 'hwsim21', set: '(null)' [ 1024.668396][ T758] kobject: 'phy22' (00000000b613710e): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1024.686918][ T758] kobject: 'phy22' (00000000b613710e): kobject_uevent_env [ 1024.695743][ T758] kobject: 'phy22' (00000000b613710e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21/ieee80211/phy22' [ 1024.722488][ T758] kobject: 'rfkill18' (00000000a0ea8d1d): kobject_add_internal: parent: 'phy22', set: 'devices' [ 1024.738753][ T758] kobject: 'rfkill18' (00000000a0ea8d1d): kobject_uevent_env [ 1024.748079][ T758] kobject: 'rfkill18' (00000000a0ea8d1d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21/ieee80211/phy22/rfkill18' [ 1024.770275][ T758] ieee80211 phy22: Selected rate control algorithm 'minstrel_ht' [ 1024.782794][ T758] kobject: 'net' (00000000963b4bb1): kobject_add_internal: parent: 'hwsim21', set: '(null)' [ 1024.798414][ T758] kobject: 'wlan0' (0000000079448cba): kobject_add_internal: parent: 'net', set: 'devices' [ 1024.817579][ T758] kobject: 'wlan0' (0000000079448cba): kobject_uevent_env [ 1024.825323][ T758] kobject: 'wlan0' (0000000079448cba): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21/net/wlan0' [ 1024.840264][ T758] kobject: 'queues' (00000000b24d36b1): kobject_add_internal: parent: 'wlan0', set: '' 17:36:45 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) prlimit64(r0, 0xf, &(0x7f0000000140)={0x9, 0x3ff}, &(0x7f0000000180)) recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/231, 0xe7}}], 0x1, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x8000) socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000600)=""/197) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) write$binfmt_aout(r1, &(0x7f0000000700)={{0x108, 0x0, 0x1218, 0x338, 0x31c, 0x4, 0x0, 0x7}, "0b0e5a1da81d27db722d49ef84fa377aacae680261dd8c62e5e6b5da161d58d1515645b95b4e68fd5862408f5863b4a3b1471914f1d947c66e3fd5c95addae8b4c8c1511b777540638f68599aa9cddae7dbd2dd5f17fef79d4f8d4cef35d8ae28de7fef190d0787edd92af5c942b25435cee2bdd0035833782d50be3ddf8f7fed6f24bc52d39f80972faf7529853e4808bec2058986725a270e0dd9a9a2e5cd9a72cf86dba6cfbe424ff7eedadcde59ef1a990e09ae2fb75092da739f3714655247817d2daca7fb6c62ea0c6a148", [[], [], []]}, 0x3ee) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="6a4e49d755d6ff67799f2dbac9c838cbe2be4bfa379637dc84613619d162a787857f3b5db5dd1a88ee4f3bcd1d816d92979d95a515a8c4edd7cba520979a6a999571fcf11a3b6fb56ed3379152b81823719163759deca17bdfdf682378894ec7d4ca9e63231229d3e0cb3bc7dfcbdede99e597cb54fcc435f6e868f30c7214565ac0") read(r2, &(0x7f0000009f9c)=""/100, 0x64) [ 1024.863416][ T758] kobject: 'queues' (00000000b24d36b1): kobject_uevent_env [ 1024.871105][ T758] kobject: 'queues' (00000000b24d36b1): kobject_uevent_env: filter function caused the event to drop! [ 1024.883917][ T758] kobject: 'rx-0' (000000005ac84f1c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.894238][ T758] kobject: 'rx-0' (000000005ac84f1c): kobject_uevent_env [ 1024.901320][ T758] kobject: 'rx-0' (000000005ac84f1c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21/net/wlan0/queues/rx-0' [ 1024.914738][ T758] kobject: 'tx-0' (00000000daae8386): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.925507][ T758] kobject: 'tx-0' (00000000daae8386): kobject_uevent_env [ 1024.932733][ T758] kobject: 'tx-0' (00000000daae8386): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21/net/wlan0/queues/tx-0' [ 1024.947648][ T758] kobject: 'tx-1' (000000009ce67203): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.957974][ T758] kobject: 'tx-1' (000000009ce67203): kobject_uevent_env [ 1024.965302][ T758] kobject: 'tx-1' (000000009ce67203): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21/net/wlan0/queues/tx-1' [ 1024.978364][ T758] kobject: 'tx-2' (00000000d19596b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1024.989939][ T758] kobject: 'tx-2' (00000000d19596b7): kobject_uevent_env [ 1024.997077][ T758] kobject: 'tx-2' (00000000d19596b7): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21/net/wlan0/queues/tx-2' [ 1025.010395][ T758] kobject: 'tx-3' (00000000b798eff0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.023239][ T758] kobject: 'tx-3' (00000000b798eff0): kobject_uevent_env [ 1025.033039][ T758] kobject: 'tx-3' (00000000b798eff0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim21/net/wlan0/queues/tx-3' 17:36:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1025.054566][ T758] kobject: 'batman_adv' (00000000b604e9d8): kobject_add_internal: parent: 'wlan0', set: '' [ 1025.065911][ T766] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1025.078453][ T766] kobject: 'hwsim22' (00000000b8ac22c9): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1025.091888][ T766] kobject: 'hwsim22' (00000000b8ac22c9): kobject_uevent_env [ 1025.100524][ T766] kobject: 'hwsim22' (00000000b8ac22c9): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22' [ 1025.115706][ T766] kobject: 'hwsim22' (00000000b8ac22c9): kobject_uevent_env [ 1025.123914][ T766] kobject: 'hwsim22' (00000000b8ac22c9): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22' [ 1025.138083][ T766] kobject: 'ieee80211' (00000000222c1384): kobject_add_internal: parent: 'hwsim22', set: '(null)' [ 1025.143020][ C1] net_ratelimit: 18 callbacks suppressed [ 1025.143028][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1025.149365][ T766] kobject: 'phy23' (0000000058889463): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1025.154590][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1025.163443][ T766] kobject: 'phy23' (0000000058889463): kobject_uevent_env [ 1025.184717][ T766] kobject: 'phy23' (0000000058889463): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22/ieee80211/phy23' [ 1025.211292][ T766] kobject: 'rfkill19' (00000000f0f67b71): kobject_add_internal: parent: 'phy23', set: 'devices' [ 1025.225023][ T766] kobject: 'rfkill19' (00000000f0f67b71): kobject_uevent_env [ 1025.233827][ T766] kobject: 'rfkill19' (00000000f0f67b71): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22/ieee80211/phy23/rfkill19' [ 1025.254354][ T766] ieee80211 phy23: Selected rate control algorithm 'minstrel_ht' [ 1025.269487][ T766] kobject: 'net' (000000004abec75f): kobject_add_internal: parent: 'hwsim22', set: '(null)' [ 1025.280103][ T766] kobject: 'wlan4' (00000000b305873d): kobject_add_internal: parent: 'net', set: 'devices' [ 1025.296149][ T766] kobject: 'wlan4' (00000000b305873d): kobject_uevent_env [ 1025.304321][ T766] kobject: 'wlan4' (00000000b305873d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22/net/wlan4' [ 1025.317369][ T766] kobject: 'queues' (000000002439cf47): kobject_add_internal: parent: 'wlan4', set: '' [ 1025.327793][ T766] kobject: 'queues' (000000002439cf47): kobject_uevent_env [ 1025.335143][ T766] kobject: 'queues' (000000002439cf47): kobject_uevent_env: filter function caused the event to drop! [ 1025.346773][ T766] kobject: 'rx-0' (000000008b1cb6e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.357725][ T766] kobject: 'rx-0' (000000008b1cb6e9): kobject_uevent_env [ 1025.365010][ T766] kobject: 'rx-0' (000000008b1cb6e9): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22/net/wlan4/queues/rx-0' [ 1025.378235][ T766] kobject: 'tx-0' (00000000476454a4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.389597][ T766] kobject: 'tx-0' (00000000476454a4): kobject_uevent_env [ 1025.396768][ T766] kobject: 'tx-0' (00000000476454a4): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22/net/wlan4/queues/tx-0' [ 1025.409925][ T766] kobject: 'tx-1' (0000000058e913dc): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.420269][ T766] kobject: 'tx-1' (0000000058e913dc): kobject_uevent_env [ 1025.427402][ T766] kobject: 'tx-1' (0000000058e913dc): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22/net/wlan4/queues/tx-1' [ 1025.440508][ T766] kobject: 'tx-2' (00000000548c0960): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.450805][ T766] kobject: 'tx-2' (00000000548c0960): kobject_uevent_env [ 1025.457983][ T766] kobject: 'tx-2' (00000000548c0960): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22/net/wlan4/queues/tx-2' [ 1025.471259][ T766] kobject: 'tx-3' (00000000b711be3f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.481516][ T766] kobject: 'tx-3' (00000000b711be3f): kobject_uevent_env [ 1025.488696][ T766] kobject: 'tx-3' (00000000b711be3f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim22/net/wlan4/queues/tx-3' [ 1025.502714][ T766] kobject: 'batman_adv' (00000000e4b6eed1): kobject_add_internal: parent: 'wlan4', set: '' 17:36:46 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1025.514014][ T764] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1025.534874][ T764] kobject: 'hwsim23' (0000000088f026a6): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1025.550899][ T764] kobject: 'hwsim23' (0000000088f026a6): kobject_uevent_env [ 1025.558803][ T764] kobject: 'hwsim23' (0000000088f026a6): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23' [ 1025.577390][ T764] kobject: 'hwsim23' (0000000088f026a6): kobject_uevent_env [ 1025.584963][ T764] kobject: 'hwsim23' (0000000088f026a6): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23' [ 1025.597177][ T764] kobject: 'ieee80211' (000000001e35ef05): kobject_add_internal: parent: 'hwsim23', set: '(null)' [ 1025.611156][ T764] kobject: 'phy24' (0000000090c7d88c): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1025.622023][ T764] kobject: 'phy24' (0000000090c7d88c): kobject_uevent_env [ 1025.629312][ T764] kobject: 'phy24' (0000000090c7d88c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23/ieee80211/phy24' [ 1025.643358][ T764] kobject: 'rfkill20' (0000000026501e16): kobject_add_internal: parent: 'phy24', set: 'devices' [ 1025.654334][ T764] kobject: 'rfkill20' (0000000026501e16): kobject_uevent_env [ 1025.661787][ T764] kobject: 'rfkill20' (0000000026501e16): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23/ieee80211/phy24/rfkill20' [ 1025.677050][ T764] ieee80211 phy24: Selected rate control algorithm 'minstrel_ht' [ 1025.686005][ T764] kobject: 'net' (00000000ebcfe611): kobject_add_internal: parent: 'hwsim23', set: '(null)' [ 1025.713128][ T764] kobject: 'wlan1' (0000000001c46e22): kobject_add_internal: parent: 'net', set: 'devices' [ 1025.728758][ T764] kobject: 'wlan1' (0000000001c46e22): kobject_uevent_env [ 1025.736867][ T764] kobject: 'wlan1' (0000000001c46e22): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23/net/wlan1' [ 1025.754935][ T764] kobject: 'queues' (000000006b5aa6ac): kobject_add_internal: parent: 'wlan1', set: '' [ 1025.767722][ T764] kobject: 'queues' (000000006b5aa6ac): kobject_uevent_env [ 1025.777491][ T764] kobject: 'queues' (000000006b5aa6ac): kobject_uevent_env: filter function caused the event to drop! [ 1025.790982][ T764] kobject: 'rx-0' (000000000bc1146d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.804087][ T764] kobject: 'rx-0' (000000000bc1146d): kobject_uevent_env [ 1025.811795][ T764] kobject: 'rx-0' (000000000bc1146d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23/net/wlan1/queues/rx-0' [ 1025.829505][ T764] kobject: 'tx-0' (00000000ed2e94f6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.841090][ T764] kobject: 'tx-0' (00000000ed2e94f6): kobject_uevent_env [ 1025.852255][ T764] kobject: 'tx-0' (00000000ed2e94f6): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23/net/wlan1/queues/tx-0' [ 1025.869303][ T764] kobject: 'tx-1' (000000007fc0255b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.880655][ T764] kobject: 'tx-1' (000000007fc0255b): kobject_uevent_env [ 1025.892353][ T764] kobject: 'tx-1' (000000007fc0255b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23/net/wlan1/queues/tx-1' [ 1025.909173][ T764] kobject: 'tx-2' (0000000060d4bd09): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.920496][ T764] kobject: 'tx-2' (0000000060d4bd09): kobject_uevent_env 17:36:46 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1025.931626][ T764] kobject: 'tx-2' (0000000060d4bd09): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23/net/wlan1/queues/tx-2' [ 1025.949168][ T764] kobject: 'tx-3' (0000000058982fc2): kobject_add_internal: parent: 'queues', set: 'queues' [ 1025.960430][ T764] kobject: 'tx-3' (0000000058982fc2): kobject_uevent_env 17:36:47 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1025.970196][ T764] kobject: 'tx-3' (0000000058982fc2): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim23/net/wlan1/queues/tx-3' [ 1025.985087][ T764] kobject: 'batman_adv' (00000000341ea576): kobject_add_internal: parent: 'wlan1', set: '' [ 1025.996644][ T772] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1026.008327][ T772] kobject: 'hwsim24' (0000000064dead47): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1026.021358][ T772] kobject: 'hwsim24' (0000000064dead47): kobject_uevent_env [ 1026.029600][ T772] kobject: 'hwsim24' (0000000064dead47): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24' [ 1026.048445][ T772] kobject: 'hwsim24' (0000000064dead47): kobject_uevent_env [ 1026.056259][ T772] kobject: 'hwsim24' (0000000064dead47): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24' [ 1026.072528][ T772] kobject: 'ieee80211' (00000000832460b2): kobject_add_internal: parent: 'hwsim24', set: '(null)' [ 1026.083636][ T772] kobject: 'phy25' (000000009da5a560): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1026.094670][ T772] kobject: 'phy25' (000000009da5a560): kobject_uevent_env [ 1026.101889][ T772] kobject: 'phy25' (000000009da5a560): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24/ieee80211/phy25' [ 1026.115596][ T772] kobject: 'rfkill21' (000000006f1c2bbb): kobject_add_internal: parent: 'phy25', set: 'devices' [ 1026.126370][ T772] kobject: 'rfkill21' (000000006f1c2bbb): kobject_uevent_env [ 1026.133919][ T772] kobject: 'rfkill21' (000000006f1c2bbb): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24/ieee80211/phy25/rfkill21' [ 1026.149216][ T772] ieee80211 phy25: Selected rate control algorithm 'minstrel_ht' [ 1026.158078][ T772] kobject: 'net' (0000000038081343): kobject_add_internal: parent: 'hwsim24', set: '(null)' [ 1026.168334][ T772] kobject: 'wlan0' (0000000038a97ef3): kobject_add_internal: parent: 'net', set: 'devices' [ 1026.179598][ T772] kobject: 'wlan0' (0000000038a97ef3): kobject_uevent_env [ 1026.186855][ T772] kobject: 'wlan0' (0000000038a97ef3): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24/net/wlan0' [ 1026.200030][ T772] kobject: 'queues' (000000006d3dfe4c): kobject_add_internal: parent: 'wlan0', set: '' [ 1026.210273][ T772] kobject: 'queues' (000000006d3dfe4c): kobject_uevent_env [ 1026.217841][ T772] kobject: 'queues' (000000006d3dfe4c): kobject_uevent_env: filter function caused the event to drop! [ 1026.229200][ T772] kobject: 'rx-0' (000000008699145d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.239892][ T772] kobject: 'rx-0' (000000008699145d): kobject_uevent_env [ 1026.247033][ T772] kobject: 'rx-0' (000000008699145d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24/net/wlan0/queues/rx-0' [ 1026.260202][ T772] kobject: 'tx-0' (0000000090120265): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.270528][ T772] kobject: 'tx-0' (0000000090120265): kobject_uevent_env [ 1026.277858][ T772] kobject: 'tx-0' (0000000090120265): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24/net/wlan0/queues/tx-0' [ 1026.290998][ T772] kobject: 'tx-1' (00000000ee034bb4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.301280][ T772] kobject: 'tx-1' (00000000ee034bb4): kobject_uevent_env [ 1026.308407][ T772] kobject: 'tx-1' (00000000ee034bb4): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24/net/wlan0/queues/tx-1' [ 1026.321729][ T772] kobject: 'tx-2' (0000000031e106a0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.332064][ T772] kobject: 'tx-2' (0000000031e106a0): kobject_uevent_env [ 1026.339216][ T772] kobject: 'tx-2' (0000000031e106a0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24/net/wlan0/queues/tx-2' [ 1026.352779][ T772] kobject: 'tx-3' (00000000142b89f0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.363546][ T772] kobject: 'tx-3' (00000000142b89f0): kobject_uevent_env [ 1026.370790][ T772] kobject: 'tx-3' (00000000142b89f0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim24/net/wlan0/queues/tx-3' 17:36:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1026.385085][ T772] kobject: 'batman_adv' (000000009e71e1bd): kobject_add_internal: parent: 'wlan0', set: '' [ 1026.396718][ T770] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1026.410282][ T770] kobject: 'hwsim25' (0000000090fcf9ae): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1026.422767][ T770] kobject: 'hwsim25' (0000000090fcf9ae): kobject_uevent_env [ 1026.430263][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1026.430350][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1026.444632][ T770] kobject: 'hwsim25' (0000000090fcf9ae): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25' [ 1026.457382][ T770] kobject: 'hwsim25' (0000000090fcf9ae): kobject_uevent_env [ 1026.470602][ T770] kobject: 'hwsim25' (0000000090fcf9ae): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25' [ 1026.484428][ T770] kobject: 'ieee80211' (0000000011aa25e9): kobject_add_internal: parent: 'hwsim25', set: '(null)' [ 1026.498742][ T770] kobject: 'phy26' (000000003004d39d): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1026.511104][ T770] kobject: 'phy26' (000000003004d39d): kobject_uevent_env [ 1026.518718][ T770] kobject: 'phy26' (000000003004d39d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25/ieee80211/phy26' [ 1026.534028][ T770] kobject: 'rfkill22' (00000000d9acb496): kobject_add_internal: parent: 'phy26', set: 'devices' [ 1026.544942][ T770] kobject: 'rfkill22' (00000000d9acb496): kobject_uevent_env [ 1026.552585][ T770] kobject: 'rfkill22' (00000000d9acb496): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25/ieee80211/phy26/rfkill22' [ 1026.567789][ T770] ieee80211 phy26: Selected rate control algorithm 'minstrel_ht' [ 1026.576399][ T770] kobject: 'net' (000000007a6d0d8f): kobject_add_internal: parent: 'hwsim25', set: '(null)' [ 1026.586609][ T770] kobject: 'wlan4' (000000003b1a3369): kobject_add_internal: parent: 'net', set: 'devices' [ 1026.597357][ T770] kobject: 'wlan4' (000000003b1a3369): kobject_uevent_env [ 1026.604581][ T770] kobject: 'wlan4' (000000003b1a3369): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25/net/wlan4' [ 1026.617084][ T770] kobject: 'queues' (00000000d179c4cc): kobject_add_internal: parent: 'wlan4', set: '' [ 1026.627388][ T770] kobject: 'queues' (00000000d179c4cc): kobject_uevent_env [ 1026.634663][ T770] kobject: 'queues' (00000000d179c4cc): kobject_uevent_env: filter function caused the event to drop! [ 1026.645874][ T770] kobject: 'rx-0' (00000000685fb320): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.656240][ T770] kobject: 'rx-0' (00000000685fb320): kobject_uevent_env [ 1026.663387][ T770] kobject: 'rx-0' (00000000685fb320): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25/net/wlan4/queues/rx-0' [ 1026.676712][ T770] kobject: 'tx-0' (00000000c43b8c77): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.687749][ T770] kobject: 'tx-0' (00000000c43b8c77): kobject_uevent_env [ 1026.694910][ T770] kobject: 'tx-0' (00000000c43b8c77): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25/net/wlan4/queues/tx-0' [ 1026.708134][ T770] kobject: 'tx-1' (00000000b9581870): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.726984][ T770] kobject: 'tx-1' (00000000b9581870): kobject_uevent_env [ 1026.734141][ T770] kobject: 'tx-1' (00000000b9581870): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25/net/wlan4/queues/tx-1' [ 1026.747561][ T770] kobject: 'tx-2' (0000000056b66e92): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.757894][ T770] kobject: 'tx-2' (0000000056b66e92): kobject_uevent_env [ 1026.765491][ T770] kobject: 'tx-2' (0000000056b66e92): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25/net/wlan4/queues/tx-2' [ 1026.778849][ T770] kobject: 'tx-3' (00000000c239a3b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1026.789501][ T770] kobject: 'tx-3' (00000000c239a3b5): kobject_uevent_env [ 1026.796762][ T770] kobject: 'tx-3' (00000000c239a3b5): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim25/net/wlan4/queues/tx-3' [ 1026.810771][ T770] kobject: 'batman_adv' (0000000049af1cef): kobject_add_internal: parent: 'wlan4', set: '' [ 1026.822579][ T782] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 17:36:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1026.833651][ T782] kobject: 'hwsim26' (00000000a8ffeaee): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1026.845958][ T782] kobject: 'hwsim26' (00000000a8ffeaee): kobject_uevent_env [ 1026.855018][ T782] kobject: 'hwsim26' (00000000a8ffeaee): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26' [ 1026.869088][ T782] kobject: 'hwsim26' (00000000a8ffeaee): kobject_uevent_env [ 1026.878090][ T782] kobject: 'hwsim26' (00000000a8ffeaee): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26' [ 1026.892058][ T782] kobject: 'ieee80211' (00000000b04aa664): kobject_add_internal: parent: 'hwsim26', set: '(null)' [ 1026.905601][ T782] kobject: 'phy27' (000000004957358c): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1026.916600][ T782] kobject: 'phy27' (000000004957358c): kobject_uevent_env [ 1026.925976][ T782] kobject: 'phy27' (000000004957358c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26/ieee80211/phy27' [ 1026.939607][ T782] kobject: 'rfkill23' (0000000033e2c969): kobject_add_internal: parent: 'phy27', set: 'devices' [ 1026.950486][ T782] kobject: 'rfkill23' (0000000033e2c969): kobject_uevent_env [ 1026.957980][ T782] kobject: 'rfkill23' (0000000033e2c969): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26/ieee80211/phy27/rfkill23' [ 1026.972785][ T782] ieee80211 phy27: Selected rate control algorithm 'minstrel_ht' [ 1026.981590][ T782] kobject: 'net' (00000000bfb881e4): kobject_add_internal: parent: 'hwsim26', set: '(null)' [ 1026.991781][ T782] kobject: 'wlan1' (00000000ed65bf27): kobject_add_internal: parent: 'net', set: 'devices' [ 1027.002504][ T782] kobject: 'wlan1' (00000000ed65bf27): kobject_uevent_env [ 1027.011355][ T782] kobject: 'wlan1' (00000000ed65bf27): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26/net/wlan1' [ 1027.024111][ T782] kobject: 'queues' (0000000049e165ec): kobject_add_internal: parent: 'wlan1', set: '' [ 1027.034381][ T782] kobject: 'queues' (0000000049e165ec): kobject_uevent_env [ 1027.041596][ T782] kobject: 'queues' (0000000049e165ec): kobject_uevent_env: filter function caused the event to drop! [ 1027.052647][ T782] kobject: 'rx-0' (000000003d376781): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.063283][ T782] kobject: 'rx-0' (000000003d376781): kobject_uevent_env [ 1027.070409][ T782] kobject: 'rx-0' (000000003d376781): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26/net/wlan1/queues/rx-0' [ 1027.073143][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1027.083643][ T782] kobject: 'tx-0' (0000000058b753fb): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.089419][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1027.099739][ T782] kobject: 'tx-0' (0000000058b753fb): kobject_uevent_env [ 1027.112408][ T782] kobject: 'tx-0' (0000000058b753fb): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26/net/wlan1/queues/tx-0' [ 1027.125798][ T782] kobject: 'tx-1' (000000003f738f4b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.136431][ T782] kobject: 'tx-1' (000000003f738f4b): kobject_uevent_env [ 1027.143620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1027.143701][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1027.143811][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1027.143864][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1027.167038][ T782] kobject: 'tx-1' (000000003f738f4b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26/net/wlan1/queues/tx-1' [ 1027.180219][ T782] kobject: 'tx-2' (0000000087e7c7a8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.190449][ T782] kobject: 'tx-2' (0000000087e7c7a8): kobject_uevent_env [ 1027.197583][ T782] kobject: 'tx-2' (0000000087e7c7a8): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26/net/wlan1/queues/tx-2' [ 1027.210820][ T782] kobject: 'tx-3' (0000000063bd3802): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.221182][ T782] kobject: 'tx-3' (0000000063bd3802): kobject_uevent_env 17:36:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1027.228526][ T782] kobject: 'tx-3' (0000000063bd3802): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim26/net/wlan1/queues/tx-3' [ 1027.242587][ T782] kobject: 'batman_adv' (0000000010d4954c): kobject_add_internal: parent: 'wlan1', set: '' [ 1027.253773][ T784] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1027.265079][ T784] kobject: 'hwsim27' (00000000d037ee5f): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1027.278224][ T784] kobject: 'hwsim27' (00000000d037ee5f): kobject_uevent_env [ 1027.286059][ T784] kobject: 'hwsim27' (00000000d037ee5f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27' [ 1027.299882][ T784] kobject: 'hwsim27' (00000000d037ee5f): kobject_uevent_env [ 1027.310095][ T784] kobject: 'hwsim27' (00000000d037ee5f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27' [ 1027.324240][ T784] kobject: 'ieee80211' (00000000b672bacb): kobject_add_internal: parent: 'hwsim27', set: '(null)' [ 1027.335764][ T784] kobject: 'phy28' (00000000579f829d): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1027.346934][ T784] kobject: 'phy28' (00000000579f829d): kobject_uevent_env [ 1027.354255][ T784] kobject: 'phy28' (00000000579f829d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27/ieee80211/phy28' [ 1027.368728][ T784] kobject: 'rfkill24' (0000000041045cdf): kobject_add_internal: parent: 'phy28', set: 'devices' [ 1027.379534][ T784] kobject: 'rfkill24' (0000000041045cdf): kobject_uevent_env [ 1027.387069][ T784] kobject: 'rfkill24' (0000000041045cdf): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27/ieee80211/phy28/rfkill24' [ 1027.403313][ T784] ieee80211 phy28: Selected rate control algorithm 'minstrel_ht' [ 1027.411879][ T784] kobject: 'net' (000000004202a8c0): kobject_add_internal: parent: 'hwsim27', set: '(null)' [ 1027.422262][ T784] kobject: 'wlan5' (0000000045942e6f): kobject_add_internal: parent: 'net', set: 'devices' [ 1027.433066][ T784] kobject: 'wlan5' (0000000045942e6f): kobject_uevent_env [ 1027.440281][ T784] kobject: 'wlan5' (0000000045942e6f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27/net/wlan5' [ 1027.452813][ T784] kobject: 'queues' (0000000045511854): kobject_add_internal: parent: 'wlan5', set: '' [ 1027.463078][ T784] kobject: 'queues' (0000000045511854): kobject_uevent_env [ 1027.470393][ T784] kobject: 'queues' (0000000045511854): kobject_uevent_env: filter function caused the event to drop! [ 1027.481446][ T784] kobject: 'rx-0' (0000000059ff415d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.491679][ T784] kobject: 'rx-0' (0000000059ff415d): kobject_uevent_env [ 1027.498810][ T784] kobject: 'rx-0' (0000000059ff415d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27/net/wlan5/queues/rx-0' [ 1027.511917][ T784] kobject: 'tx-0' (0000000029a5c766): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.522226][ T784] kobject: 'tx-0' (0000000029a5c766): kobject_uevent_env [ 1027.529785][ T784] kobject: 'tx-0' (0000000029a5c766): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27/net/wlan5/queues/tx-0' [ 1027.542983][ T784] kobject: 'tx-1' (000000001fcce207): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.553272][ T784] kobject: 'tx-1' (000000001fcce207): kobject_uevent_env [ 1027.560368][ T784] kobject: 'tx-1' (000000001fcce207): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27/net/wlan5/queues/tx-1' [ 1027.573482][ T784] kobject: 'tx-2' (000000007efb5493): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.583814][ T784] kobject: 'tx-2' (000000007efb5493): kobject_uevent_env [ 1027.590940][ T784] kobject: 'tx-2' (000000007efb5493): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27/net/wlan5/queues/tx-2' [ 1027.604067][ T784] kobject: 'tx-3' (00000000f3f3347b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.614426][ T784] kobject: 'tx-3' (00000000f3f3347b): kobject_uevent_env [ 1027.621513][ T784] kobject: 'tx-3' (00000000f3f3347b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim27/net/wlan5/queues/tx-3' 17:36:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1027.636281][ T784] kobject: 'batman_adv' (000000003f8196ee): kobject_add_internal: parent: 'wlan5', set: '' [ 1027.655909][ T786] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1027.666276][ T786] kobject: 'hwsim28' (00000000d5c98b40): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1027.678101][ T786] kobject: 'hwsim28' (00000000d5c98b40): kobject_uevent_env [ 1027.687102][ T786] kobject: 'hwsim28' (00000000d5c98b40): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28' [ 1027.705840][ T786] kobject: 'hwsim28' (00000000d5c98b40): kobject_uevent_env [ 1027.717952][ T786] kobject: 'hwsim28' (00000000d5c98b40): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28' [ 1027.733024][ T786] kobject: 'ieee80211' (00000000d6ea5b8f): kobject_add_internal: parent: 'hwsim28', set: '(null)' [ 1027.743885][ T786] kobject: 'phy29' (000000000e1582a7): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1027.756205][ T786] kobject: 'phy29' (000000000e1582a7): kobject_uevent_env [ 1027.763438][ T786] kobject: 'phy29' (000000000e1582a7): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28/ieee80211/phy29' [ 1027.777114][ T786] kobject: 'rfkill25' (000000000430e9fe): kobject_add_internal: parent: 'phy29', set: 'devices' [ 1027.788128][ T786] kobject: 'rfkill25' (000000000430e9fe): kobject_uevent_env [ 1027.795661][ T786] kobject: 'rfkill25' (000000000430e9fe): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28/ieee80211/phy29/rfkill25' [ 1027.810330][ T786] ieee80211 phy29: Selected rate control algorithm 'minstrel_ht' [ 1027.819123][ T786] kobject: 'net' (000000009cb7d084): kobject_add_internal: parent: 'hwsim28', set: '(null)' [ 1027.829294][ T786] kobject: 'wlan4' (00000000b2787331): kobject_add_internal: parent: 'net', set: 'devices' [ 1027.840072][ T786] kobject: 'wlan4' (00000000b2787331): kobject_uevent_env [ 1027.847276][ T786] kobject: 'wlan4' (00000000b2787331): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28/net/wlan4' [ 1027.859433][ T786] kobject: 'queues' (00000000a3d3da08): kobject_add_internal: parent: 'wlan4', set: '' [ 1027.869807][ T786] kobject: 'queues' (00000000a3d3da08): kobject_uevent_env [ 1027.877732][ T786] kobject: 'queues' (00000000a3d3da08): kobject_uevent_env: filter function caused the event to drop! [ 1027.888803][ T786] kobject: 'rx-0' (0000000039312520): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.899046][ T786] kobject: 'rx-0' (0000000039312520): kobject_uevent_env [ 1027.906197][ T786] kobject: 'rx-0' (0000000039312520): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28/net/wlan4/queues/rx-0' [ 1027.919689][ T786] kobject: 'tx-0' (0000000025bcfb23): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.930015][ T786] kobject: 'tx-0' (0000000025bcfb23): kobject_uevent_env [ 1027.937215][ T786] kobject: 'tx-0' (0000000025bcfb23): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28/net/wlan4/queues/tx-0' [ 1027.950407][ T786] kobject: 'tx-1' (00000000f618438b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.962213][ T786] kobject: 'tx-1' (00000000f618438b): kobject_uevent_env [ 1027.969342][ T786] kobject: 'tx-1' (00000000f618438b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28/net/wlan4/queues/tx-1' [ 1027.982457][ T786] kobject: 'tx-2' (0000000056a9c5aa): kobject_add_internal: parent: 'queues', set: 'queues' [ 1027.992754][ T786] kobject: 'tx-2' (0000000056a9c5aa): kobject_uevent_env [ 1027.999884][ T786] kobject: 'tx-2' (0000000056a9c5aa): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28/net/wlan4/queues/tx-2' [ 1028.013118][ T786] kobject: 'tx-3' (0000000065f50614): kobject_add_internal: parent: 'queues', set: 'queues' [ 1028.023518][ T786] kobject: 'tx-3' (0000000065f50614): kobject_uevent_env 17:36:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1028.030720][ T786] kobject: 'tx-3' (0000000065f50614): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim28/net/wlan4/queues/tx-3' [ 1028.045000][ T786] kobject: 'batman_adv' (00000000725ba51c): kobject_add_internal: parent: 'wlan4', set: '' [ 1028.056304][ T788] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1028.067015][ T788] kobject: 'hwsim29' (00000000f40b9063): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1028.080663][ T788] kobject: 'hwsim29' (00000000f40b9063): kobject_uevent_env [ 1028.088399][ T788] kobject: 'hwsim29' (00000000f40b9063): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29' [ 1028.102141][ T788] kobject: 'hwsim29' (00000000f40b9063): kobject_uevent_env [ 1028.110742][ T788] kobject: 'hwsim29' (00000000f40b9063): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29' [ 1028.124254][ T788] kobject: 'ieee80211' (000000009a61eca2): kobject_add_internal: parent: 'hwsim29', set: '(null)' [ 1028.135830][ T788] kobject: 'phy30' (00000000ed2377a2): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1028.146710][ T788] kobject: 'phy30' (00000000ed2377a2): kobject_uevent_env [ 1028.154013][ T788] kobject: 'phy30' (00000000ed2377a2): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29/ieee80211/phy30' [ 1028.167725][ T788] kobject: 'rfkill26' (00000000a3f7d22c): kobject_add_internal: parent: 'phy30', set: 'devices' [ 1028.178657][ T788] kobject: 'rfkill26' (00000000a3f7d22c): kobject_uevent_env [ 1028.186235][ T788] kobject: 'rfkill26' (00000000a3f7d22c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29/ieee80211/phy30/rfkill26' [ 1028.202013][ T788] ieee80211 phy30: Selected rate control algorithm 'minstrel_ht' [ 1028.210803][ T788] kobject: 'net' (000000002b8db1ca): kobject_add_internal: parent: 'hwsim29', set: '(null)' [ 1028.220962][ T788] kobject: 'wlan2' (0000000097438be6): kobject_add_internal: parent: 'net', set: 'devices' [ 1028.231636][ T788] kobject: 'wlan2' (0000000097438be6): kobject_uevent_env [ 1028.238851][ T788] kobject: 'wlan2' (0000000097438be6): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29/net/wlan2' [ 1028.251138][ T788] kobject: 'queues' (0000000034fc3ba3): kobject_add_internal: parent: 'wlan2', set: '' [ 1028.261418][ T788] kobject: 'queues' (0000000034fc3ba3): kobject_uevent_env [ 1028.268695][ T788] kobject: 'queues' (0000000034fc3ba3): kobject_uevent_env: filter function caused the event to drop! [ 1028.279731][ T788] kobject: 'rx-0' (00000000def56387): kobject_add_internal: parent: 'queues', set: 'queues' [ 1028.289958][ T788] kobject: 'rx-0' (00000000def56387): kobject_uevent_env [ 1028.297066][ T788] kobject: 'rx-0' (00000000def56387): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29/net/wlan2/queues/rx-0' [ 1028.310503][ T788] kobject: 'tx-0' (0000000027aa9312): kobject_add_internal: parent: 'queues', set: 'queues' [ 1028.320818][ T788] kobject: 'tx-0' (0000000027aa9312): kobject_uevent_env [ 1028.328072][ T788] kobject: 'tx-0' (0000000027aa9312): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29/net/wlan2/queues/tx-0' [ 1028.341278][ T788] kobject: 'tx-1' (00000000b711fe1d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1028.351669][ T788] kobject: 'tx-1' (00000000b711fe1d): kobject_uevent_env [ 1028.358829][ T788] kobject: 'tx-1' (00000000b711fe1d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29/net/wlan2/queues/tx-1' [ 1028.371930][ T788] kobject: 'tx-2' (00000000b8417b9b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1028.382346][ T788] kobject: 'tx-2' (00000000b8417b9b): kobject_uevent_env [ 1028.389496][ T788] kobject: 'tx-2' (00000000b8417b9b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29/net/wlan2/queues/tx-2' [ 1028.402613][ T788] kobject: 'tx-3' (00000000c8e51cf1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1028.412881][ T788] kobject: 'tx-3' (00000000c8e51cf1): kobject_uevent_env [ 1028.420014][ T788] kobject: 'tx-3' (00000000c8e51cf1): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim29/net/wlan2/queues/tx-3' 17:36:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380)=r4, 0x4) r5 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x2, 0x8, 0x10000, 0x0, 0x7f, 0x10, 0x2, 0x8, 0x80000001, 0x3, 0x7, 0x3, 0x6, 0x1a9, 0x46, 0x2, 0x6, 0x0, 0x20, 0x8c, 0x8001, 0x9, 0x401, 0x4ec0, 0x726, 0x4, 0xffff, 0x401, 0x7, 0x4, 0x10001, 0x7, 0x1, 0x8001, 0xffffffff00000001, 0x0, 0x7, 0x0, @perf_config_ext={0x7}, 0x8000, 0x7fff, 0xfffffffffffffff8, 0xb, 0x4, 0xffff, 0x24}, r5, 0xffffffffffffffff, r2, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x7, 0x70, 0x5, 0x2, 0x1, 0x8, 0x0, 0x7, 0x400, 0x4, 0x1ab50157, 0x6, 0xfffffffffffffff9, 0x5, 0x600, 0x101, 0x7, 0x6, 0x2, 0x4, 0x8, 0x8b3, 0x8, 0x3, 0x80, 0x4, 0x1, 0x9, 0x81, 0x9a, 0x2, 0x4, 0x2350, 0x0, 0x8, 0x7ff, 0x200, 0x7, 0x0, 0xd56f, 0x3, @perf_config_ext={0x2, 0x3}, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x3, 0x4}, r0, 0xd, r6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000600)={0x0, 0x70, 0x1, 0x8, 0x7, 0x9, 0x0, 0x9, 0x2bd63f5ee9c4adb3, 0x1, 0xfffffffffffffff8, 0x229a, 0x1, 0x5, 0x0, 0x3ff, 0x8, 0x800, 0x3f87, 0x7f, 0x40004000000, 0x3, 0x3a, 0x6c34, 0x400, 0x1, 0x100, 0x2, 0x4, 0x80, 0x7, 0x7, 0x0, 0x0, 0x2, 0x80, 0x7, 0xa2, 0x0, 0x4, 0x6, @perf_bp={&(0x7f00000005c0), 0x1}, 0x18001, 0x10001, 0x0, 0x7, 0x8, 0x73a6, 0x10000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xbfffffffffffffff, r6, 0x0) r7 = socket$kcm(0xa, 0x8100000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu//yz0\xf6', 0x1ff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x100000001) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000580)) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000006c0)={r3}) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000000700)=0x542) sendmsg$kcm(r7, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0, 0x263}, 0x200008c4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = socket$kcm(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) getpid() sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) [ 1028.434267][ T788] kobject: 'batman_adv' (000000001bb74af7): kobject_add_internal: parent: 'wlan2', set: '' [ 1028.445563][ T790] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1028.456225][ T790] kobject: 'hwsim30' (00000000fb3df038): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1028.468834][ T790] kobject: 'hwsim30' (00000000fb3df038): kobject_uevent_env [ 1028.476911][ T790] kobject: 'hwsim30' (00000000fb3df038): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim30' [ 1028.490694][ T790] kobject: 'hwsim30' (00000000fb3df038): kobject_uevent_env [ 1028.499314][ T790] kobject: 'hwsim30' (00000000fb3df038): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim30' [ 1028.517883][ T790] kobject: 'ieee80211' (00000000a5650af2): kobject_add_internal: parent: 'hwsim30', set: '(null)' [ 1028.528640][ T790] kobject: 'phy31' (000000006a6e4335): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1028.539659][ T790] kobject: 'phy31' (000000006a6e4335): kobject_uevent_env [ 1028.547323][ T790] kobject: 'phy31' (000000006a6e4335): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim30/ieee80211/phy31' [ 1028.561130][ T790