[ 65.271499][ T26] audit: type=1800 audit(1566702508.996:32): pid=10095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 65.958531][ T26] audit: type=1800 audit(1566702509.746:33): pid=10095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.20' (ECDSA) to the list of known hosts. 2019/08/25 03:08:39 fuzzer started syzkaller login: [ 75.706183][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 75.706196][ T26] audit: type=1400 audit(1566702519.496:36): avc: denied { map } for pid=10280 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/08/25 03:08:41 dialing manager at 10.128.0.26:46519 2019/08/25 03:08:42 syscalls: 2510 2019/08/25 03:08:42 code coverage: enabled 2019/08/25 03:08:42 comparison tracing: enabled 2019/08/25 03:08:42 extra coverage: extra coverage is not supported by the kernel 2019/08/25 03:08:42 setuid sandbox: enabled 2019/08/25 03:08:42 namespace sandbox: enabled 2019/08/25 03:08:42 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/25 03:08:42 fault injection: enabled 2019/08/25 03:08:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/25 03:08:42 net packet injection: enabled 2019/08/25 03:08:42 net device setup: enabled 03:10:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1) r1 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$inet6_mtu(r2, 0x29, 0x17, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x4182) r4 = memfd_create(&(0x7f0000000080)='\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280)={0x200}, 0x8) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, 0x0, 0x2400002c) [ 165.941349][ T26] audit: type=1400 audit(1566702609.736:37): avc: denied { map } for pid=10295 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1077 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 166.025550][T10296] IPVS: ftp: loaded support on port[0] = 21 03:10:09 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) sendto$inet(r1, &(0x7f0000000300)="2ee6092ab15e2c1fd63bb65fbefac145a6fbabf97b71b913a7629e0e3613f2782f7cd81b99089e6261811ac7f80f80cd16bfbc07158a1be8b3b47b31400d95f2e9ae5504973a4a2467122fed2e604231aac2166c8be00492cdaad9f502c8df05aeb34023b17522dc5a", 0x69, 0x200400c0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) fcntl$setflags(r2, 0x2, 0x1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xb2) getpid() getpgid(0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r2, 0x0, 0x3, &(0x7f0000000280)='syz', 0xffffffffffffffff}, 0x30) r4 = fcntl$getown(r0, 0x9) r5 = syz_open_procfs(r4, &(0x7f0000000200)='net/route\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setfsuid(0x0) preadv(r5, &(0x7f00000017c0), 0x199, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) [ 166.136112][T10296] chnl_net:caif_netlink_parms(): no params data found [ 166.187582][T10296] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.194929][T10296] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.203162][T10296] device bridge_slave_0 entered promiscuous mode [ 166.203844][T10299] IPVS: ftp: loaded support on port[0] = 21 [ 166.216113][T10296] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.223680][T10296] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.231443][T10296] device bridge_slave_1 entered promiscuous mode [ 166.249919][T10296] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.263031][T10296] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:10:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) dup3(r0, r2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7}, 0x7) [ 166.301355][T10296] team0: Port device team_slave_0 added [ 166.308697][T10296] team0: Port device team_slave_1 added 03:10:10 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x2e207defb34af85c, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, 0x0, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x715921216b75d796) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000980)=[{0x0}], 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000000)=""/28, &(0x7f0000000080)=0x1c) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x10000, 0x0) sendfile(r5, r5, 0x0, 0x2000005) dup3(r6, r5, 0x80000) [ 166.512393][T10296] device hsr_slave_0 entered promiscuous mode 03:10:10 executing program 4: r0 = syz_open_procfs(0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x932b4be25ede0c28) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 166.638737][T10296] device hsr_slave_1 entered promiscuous mode [ 166.735324][T10296] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.742437][T10296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.742567][T10296] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.751938][T10304] IPVS: ftp: loaded support on port[0] = 21 [ 166.756685][T10296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.784499][T10302] IPVS: ftp: loaded support on port[0] = 21 [ 166.807427][T10299] chnl_net:caif_netlink_parms(): no params data found [ 166.817714][T10307] IPVS: ftp: loaded support on port[0] = 21 03:10:10 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) [ 166.977375][T10296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.989679][T10299] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.996759][T10299] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.006336][T10299] device bridge_slave_0 entered promiscuous mode [ 167.015011][T10299] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.022480][T10299] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.030048][T10299] device bridge_slave_1 entered promiscuous mode [ 167.064322][T10299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.121057][T10299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.138698][T10307] chnl_net:caif_netlink_parms(): no params data found [ 167.151047][T10309] IPVS: ftp: loaded support on port[0] = 21 [ 167.166015][T10300] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.174567][T10300] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.182636][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 167.198017][T10299] team0: Port device team_slave_0 added [ 167.206404][T10299] team0: Port device team_slave_1 added [ 167.221655][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.229852][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.239327][T10302] chnl_net:caif_netlink_parms(): no params data found [ 167.257660][T10296] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.270114][T10304] chnl_net:caif_netlink_parms(): no params data found [ 167.293305][T10302] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.301028][T10302] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.309565][T10302] device bridge_slave_0 entered promiscuous mode [ 167.331493][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.341397][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.349654][T10313] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.356671][T10313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.368548][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.376995][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.385691][T10315] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.392759][T10315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.400584][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.409056][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.417705][T10302] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.425115][T10302] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.432772][T10302] device bridge_slave_1 entered promiscuous mode [ 167.500852][T10299] device hsr_slave_0 entered promiscuous mode [ 167.539137][T10299] device hsr_slave_1 entered promiscuous mode [ 167.588544][T10299] debugfs: Directory 'hsr0' with parent '/' already present! [ 167.605438][T10302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.617568][T10302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.643224][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.651873][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.660320][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.669656][T10307] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.676704][T10307] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.684339][T10307] device bridge_slave_0 entered promiscuous mode [ 167.693544][T10307] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.701333][T10307] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.709149][T10307] device bridge_slave_1 entered promiscuous mode [ 167.727748][T10302] team0: Port device team_slave_0 added [ 167.737847][T10302] team0: Port device team_slave_1 added [ 167.757800][T10304] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.765027][T10304] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.772671][T10304] device bridge_slave_0 entered promiscuous mode [ 167.780263][T10304] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.787906][T10304] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.795543][T10304] device bridge_slave_1 entered promiscuous mode [ 167.812691][T10307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.823368][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.832125][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.840502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.848724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.910838][T10302] device hsr_slave_0 entered promiscuous mode [ 167.948855][T10302] device hsr_slave_1 entered promiscuous mode [ 167.988650][T10302] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.003897][T10307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.030723][T10304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.041136][T10307] team0: Port device team_slave_0 added [ 168.047920][T10307] team0: Port device team_slave_1 added [ 168.056136][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.064629][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.074151][T10304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.140123][T10307] device hsr_slave_0 entered promiscuous mode [ 168.178949][T10307] device hsr_slave_1 entered promiscuous mode [ 168.228585][T10307] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.237961][T10296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.301273][T10296] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.328511][T10304] team0: Port device team_slave_0 added [ 168.343221][T10309] chnl_net:caif_netlink_parms(): no params data found [ 168.359442][T10302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.378808][T10299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.393890][T10304] team0: Port device team_slave_1 added [ 168.411346][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.419561][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.438859][T10302] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.446237][ T26] audit: type=1400 audit(1566702612.236:38): avc: denied { associate } for pid=10296 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 168.501627][T10299] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.525373][T10309] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.532776][T10309] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.541018][T10309] device bridge_slave_0 entered promiscuous mode [ 168.548043][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.555956][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.567064][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.575669][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.584089][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.591179][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.611873][T10307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.623398][T10309] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.631972][T10309] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.641070][T10309] device bridge_slave_1 entered promiscuous mode [ 168.648246][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.656773][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.665393][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.673772][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.680861][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.689019][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.697554][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.706017][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.713165][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.720912][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.729371][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.737575][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.744644][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.752373][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:10:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1) r1 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$inet6_mtu(r2, 0x29, 0x17, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x4182) r4 = memfd_create(&(0x7f0000000080)='\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280)={0x200}, 0x8) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, 0x0, 0x2400002c) [ 168.810007][T10304] device hsr_slave_0 entered promiscuous mode [ 168.849590][T10304] device hsr_slave_1 entered promiscuous mode [ 168.898545][T10304] debugfs: Directory 'hsr0' with parent '/' already present! 03:10:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1) r1 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$inet6_mtu(r2, 0x29, 0x17, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x4, 0x4182) r4 = memfd_create(&(0x7f0000000080)='\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$SG_GET_RESERVED_SIZE(r4, 0x2272, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280)={0x200}, 0x8) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, 0x0, 0x2400002c) [ 168.942487][T10309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.971506][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.988428][ C0] hrtimer: interrupt took 23039 ns [ 168.988790][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.002288][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.012242][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.029994][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 03:10:12 executing program 0: [ 169.041018][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.049495][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.058099][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.069187][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.077483][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.086323][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.094720][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.103118][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.111413][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.119621][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.127709][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.135864][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.143543][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.156302][T10309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:10:13 executing program 0: [ 169.195988][T10302] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 169.213866][T10302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:10:13 executing program 0: 03:10:13 executing program 0: [ 169.241250][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.250106][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.257801][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.274429][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.283338][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 03:10:13 executing program 0: [ 169.294352][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.323974][T10307] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.354228][T10299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.385701][T10302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.406722][T10309] team0: Port device team_slave_0 added [ 169.442950][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.453204][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.470091][ T3024] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.477146][ T3024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.485257][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.493774][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.502301][ T3024] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.509366][ T3024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.517040][ T3024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.526997][T10309] team0: Port device team_slave_1 added [ 169.536617][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.544784][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.566785][T10304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.610495][T10309] device hsr_slave_0 entered promiscuous mode [ 169.668864][T10309] device hsr_slave_1 entered promiscuous mode [ 169.728531][T10309] debugfs: Directory 'hsr0' with parent '/' already present! [ 169.743497][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.751386][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.785295][T10307] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 169.796047][T10307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 169.816089][T10304] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.834863][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.860504][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.899256][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.907873][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.918787][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.927923][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.940578][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 03:10:13 executing program 1: [ 169.951714][T10300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.973624][T10307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.985036][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.006097][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.045696][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 03:10:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) dup3(r0, r2, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000080)={0x7}, 0x7) [ 170.057299][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.067100][T10313] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.074194][T10313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.090907][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.102247][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.110721][T10313] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.117757][T10313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.125396][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.133829][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.142647][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.151187][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.159515][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.167823][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.185651][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.193591][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.203803][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.212243][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.221723][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.230140][T10313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.239363][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.274949][T10304] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.303450][T10309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.331230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.349135][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.365583][T10309] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.393486][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.406794][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.422122][T10315] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.429256][T10315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.442984][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.451794][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.460490][T10315] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.467523][T10315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.475384][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.484133][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.494578][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.509080][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.517829][T10315] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.543744][T10309] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 170.558507][T10309] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.570956][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.581709][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.602028][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.610655][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.622186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.630737][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.639340][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.648841][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.660714][ T26] audit: type=1400 audit(1566702614.456:39): avc: denied { create } for pid=10391 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 170.711638][T10309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.712665][ T26] audit: type=1400 audit(1566702614.456:40): avc: denied { write } for pid=10391 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 170.745461][ T26] audit: type=1400 audit(1566702614.456:41): avc: denied { read } for pid=10391 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:15 executing program 1: 03:10:15 executing program 0: 03:10:15 executing program 2: 03:10:15 executing program 4: 03:10:15 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x2e207defb34af85c, 0x0) setsockopt$inet_opts(r3, 0x0, 0x4, 0x0, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x8, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x715921216b75d796) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000980)=[{0x0}], 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r6 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000000)=""/28, &(0x7f0000000080)=0x1c) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x10000, 0x0) sendfile(r5, r5, 0x0, 0x2000005) dup3(r6, r5, 0x80000) 03:10:15 executing program 5: 03:10:15 executing program 0: 03:10:15 executing program 1: 03:10:15 executing program 4: 03:10:15 executing program 2: 03:10:15 executing program 5: 03:10:15 executing program 0: 03:10:15 executing program 5: 03:10:15 executing program 0: getresuid(0xfffffffffffffffd, 0x0, 0x0) getresuid(&(0x7f0000000100), &(0x7f00000000c0), &(0x7f0000000140)) 03:10:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000001500)={{0x2, 0x0, @local}, {0x0, @dev}, 0x10000014c, {0x2, 0x0, @multicast1}, 'ip6tnl0\x00'}) 03:10:15 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) r2 = getpgid(0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x400202, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000001c0)={r3, r0, 0x6}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) write$selinux_create(r4, &(0x7f00000000c0)=@objname={'system_u:object_r:useradd_exec_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x7ff, 0x20, './file0\x00'}, 0x66) [ 171.793011][ T26] audit: type=1400 audit(1566702615.566:42): avc: denied { map } for pid=10437 comm="syz-executor.4" path="socket:[30549]" dev="sockfs" ino=30549 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 03:10:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) unshare(0x28020400) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) lseek(r0, 0x0, 0x1) 03:10:16 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x3dfc4ee8, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x840c383e62995b29, &(0x7f0000000900)=0x40, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) sendmsg$unix(r1, &(0x7f0000000540)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000200)="e3d10b80c3ed63c8ed495ff4e9611f3788219f89d854bc801aa46f461eb7782ada8b9972", 0x24}, {&(0x7f00000003c0)="c8aeb7bf6eed146ebe3daa6395c9c15d7824e1fa7308edfbf7877685795a62adfb4f377a5c2b2a1f1db5260830856f09adea8fbe21e54310381ed8fd766aec914c53a84bebec6287ae03e3bbebd7c132b81ed4c2e202504f94753e0f0864662b08455e16b4fee443104e35082bd46ad7eb4709814b83ec58af0613f8d2df539b909a83418cefe61dbea9c097f04350b66d9cde26e37a843ee2deaa0a6c329b0dd56726c0", 0xa4}, {&(0x7f0000000480)="424e901ee4cd71517dba6cc1908a3b31af197514e6c70e2b7c962c3110e2954765184aba65bc96844007f97582e76a1925f928a4bef6908a69ddb12c2216ed14e9a887595691301de3644a", 0x4b}], 0x3, 0x0, 0x0, 0x4000841}, 0x40000) r3 = getpid() r4 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r4, &(0x7f0000000180)=""/28, 0x1c) accept$packet(r1, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005700)=0x14) getsockname$packet(r1, &(0x7f0000007200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007240)=0x14) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000008f00)={@initdev, @local, 0x0}, &(0x7f0000008f40)=0xc) sendmmsg$inet6(r0, &(0x7f000000a480)=[{{&(0x7f0000000600)={0xa, 0x4e22, 0xf1, @ipv4={[], [], @loopback}}, 0x1c, &(0x7f0000000740)=[{&(0x7f0000000640)="ff5457d5641e1027c3776ebb822bbbb633486c871d04db32bc0a47bd7cd891231b5ae54c3c7ddf838fc2a7764ca9cfd84669ee2ef77ba26fd64307ebed6befe9084dd27538718138238be223b42094c10acbb8b3b609ab4bba8d16b785218eab0b78fe21809b686bfb312eb7440b32bbf1e70fd28f6dde6d5434ec6f823d454a8bc0629bcbad0af0d093fcb1c495a0f3f7dc9c04078a2fc0875466ba8e48219672dce0253c11e9afab5ad175dda19d9ae3f34d156c4775b0e187da04c605164a145305f4", 0xc4}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="38000000000000002900000039000000320402ff000000003ef246af5283b6e3f3192e2a5cf41dbafe88000000000000000000000000000124000000000000002900000032000000fe800000000000000000000000000016", @ANYRES32=r5, @ANYBLOB="0000000014000000000000002900000008000000feffffff00000000140000000000000029000000430000000000000000000000280000000000000029000000390000004302034f00000000ff0100000000000000000000000000011400000000000000290000003e00000007000000000000001400000000000000290000000800000000000000000000002000000000000000290000003600000000000000000000000401c30000000000bedccc7e41141e8b235f6e5c6b559d"], 0x108}}, {{&(0x7f0000005880)={0xa, 0x4e23, 0x3ff, @dev={0xfe, 0x80, [], 0xe}}, 0x1c, &(0x7f0000005940)=[{&(0x7f00000058c0)="5a3edd1d7bf899bb1aa609498a40c770621b966b86a4d6f44a6261464da4c0c30eb00e73588aefe14d6fae9e54d75ee32e3a052f60039cede45b1def23e3bab95ec52c19fda400c5f889620f33db07eeea1ff629b16a7827d438ae465d3a278c3cc66386a6bd74be4a2f94621653bbf7c8d75d0520dd2f240b57", 0x7a}], 0x1, &(0x7f0000005980)=[@hoplimit={{0x14, 0x29, 0x34, 0x6}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x100000001}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @tclass={{0x14, 0x29, 0x43, 0x6}}], 0x60}}, {{&(0x7f0000005a00)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x1b}}, 0x1c, &(0x7f0000005b00)=[{&(0x7f0000005a40)="670344763a51d0a606c9e5571bcb7ef9050a64caab3201a776e3359653c6c328f540a24cf2f52d3d95c007ee2316086cdbcea7103ca134f29fe7b5e8c8cd435590140954e6b3e6b058a14a8ed06f45306bacbb33a2e26aedd41cac6070b92f5e8df4baf1b62c02a55a6329452d8e0463eb6e75527dcfd02c6dc2d6092bd8e71bf5fcd3cbc454a3d9897bc265c5c8b4e63d55dc42908659b8398b1ddfc120055925cacd6d8329f0be84e0", 0xaa}], 0x1, &(0x7f0000005b40)=[@hopopts_2292={{0x138, 0x29, 0x36, {0x2f, 0x23, [], [@enc_lim={0x4, 0x1, 0x81}, @enc_lim={0x4, 0x1, 0x100000001}, @generic={0x100000001, 0xe0, "dfd6ccd568362d95e95a0b8196afc02a89f58b01f254538e700d967a935fcc9f636c181ae1f8abce1b9bd0f5a5c318bcf69387bff27a6a1ce7171009618d8a64e86895c2bcd0d36896657a07f6f61263bf7faf330b56ef47b6d7492d3edd308d17dc449e74dc8b8e1d62cbba3637d2dc1bd6666e1e944c1a508ae46d958262748a0ee00498701087c3bdf895dfa26771cacf5e77f299b1413ebf0aed643068d10f6d928f6d24717902d25fbd9c56f437f1148b15ce66736f4e6c11d6c9fad5587b49722c6637ed393f8a1462d6758d67bf5431355d415474eef5ac3b75a1bfd4"}, @ra={0x5, 0x2, 0x4}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x195, 0x21, "f79d53954ce9e6d6e76c07c247f1feb2bff86a1db938702b92f21ee2994eb4b73e"}, @pad1]}}}, @rthdr={{0xb8, 0x29, 0x39, {0x2c, 0x14, 0x1, 0x10001, 0x0, [@dev={0xfe, 0x80, [], 0xa}, @rand_addr="6b5b0339d8215d3993c3a52e530a75f6", @loopback, @ipv4={[], [], @multicast1}, @ipv4={[], [], @empty}, @rand_addr="f0a1b7a3605d9a19d5f346c689865ecb", @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0xa}, @ipv4={[], [], @multicast2}, @dev={0xfe, 0x80, [], 0xe}]}}}, @hopopts={{0x50, 0x29, 0x36, {0x88, 0x6, [], [@calipso={0x7, 0x30, {0x0, 0xa, 0x3ff, 0x0, [0x0, 0x6, 0xec1, 0xfc, 0x664f]}}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8001}}], 0x270}}, {{&(0x7f0000005dc0)={0xa, 0x4e21, 0x101, @local, 0x100000001}, 0x1c, &(0x7f0000006e00)=[{&(0x7f0000005e00)="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", 0x1000}], 0x1, &(0x7f0000006e40)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}, @dstopts={{0x20, 0x29, 0x37, {0x87, 0x0, [], [@pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @hoplimit={{0x14, 0x29, 0x34, 0x34}}, @flowinfo={{0x14, 0x29, 0xb, 0x3}}, @rthdr={{0x28, 0x29, 0x39, {0x2c, 0x2, 0x3, 0x3ff, 0x0, [@empty]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x8, 0x1, [], [@jumbo={0xc2, 0x4, 0x2}, @enc_lim={0x4, 0x1, 0x5}]}}}], 0x100}}, {{0x0, 0x0, &(0x7f0000007080)=[{&(0x7f0000006f40)="32c49b2d951a6be3c5ecfecfeaced1b696", 0x11}, {&(0x7f0000006f80)="98d0cf6d14115549b758054ae27b5ec31b1dd5d07118964919316221573beb241ee54405a6d539ab118bf9093f422b7252b916084dff1085d76162476a5159579ecf598962f1faa4c29271ace4d487e6b42e8fa7440264b7049f21e11aadc86bc9940a0462df6c4556020cb0da09b296d69cd5dad584ca084d7370d13bebfea6bdb51e5159d5cc29e534f6f9a813fa30ae484d6dbbb34da46b9e5ade5de92ffa0fd5fc98818420407ab035ea1158bb5c7090a0a236a1ac1fe882eb9e43e4767120a356ed92d8b39fee941f8af237f044e797517085dc0487a6933bc749a70478c95bb842390a4fe27c", 0xe9}], 0x2, &(0x7f0000007280)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x12}, r6}}}], 0x28}}, {{&(0x7f00000072c0)={0xa, 0x4e23, 0x3e, @rand_addr="ee00f32f88f02c083e14a9854dd26ddc", 0x8}, 0x1c, &(0x7f0000008780)=[{&(0x7f0000007300)="066caa90686f6dfb5147eab91c248faea39fc3457dd495d2d7731ef6dc3b887ab0e1657056bb556964763f42cda593cd0f406372ccb66bc8607d3e6fe48cf6f6622f14e3acc0316e08476a4e57aca5487ba96520f80e04a7dcc5360cf7b11ea8c32be87abcefdf6595e6d2259f9c0667f2af9e195f890c4d7e7fd2f6ebd2e7a075693904c24db511cc976eb9aeac16d5d470baa9a63f1b88bec73198a06ce80541fd6ccf9bbe62a1d6b5776330b647d20e58852b28a688d742ed6235c199360ba94354479f0cef7f045b25594bccf5746c3b0d8ef25feec910fa32da97a5294bf40b40966fd0722338648fa7a1d3ea29370cd56c", 0xf4}, {&(0x7f0000007400)="5bafa0ddc759c09a1c5069f23ca5d8b8bf769718cfef468dbd0d9db5c4c2cb90c4373c6c099e61293584dc4bd4d177ddd51502e571aff343d679c1663dd1b903bfbabecdde11262ff5bf0ae526043d62509de763f39d73333af9c7e61883cea24b1cd1b333e262b10727e7eebb2305bedfb08f5b0da8cc8cf42c8e3435ed2dc11a51938c8fdabeed5f3dbfd9834e5583b46079af813f393fa354c30da5a21c2c12fbfb927d8eaa44975af4b03459dc292de17a24a128410e1fa6ed1c5451865ca5864c27980786a4d9aac2f874c048307a0e323149cc130abbe8adcafbdadad3392709d4efb5040f2f7fbc1e895d4d5b652b", 0xf2}, {&(0x7f0000007500)}, {&(0x7f0000007540)="f4739f8d0711ad3b8971b31e21659d0f1c832239f62ada3cd5b761a6cec6579a5c16a97c21e59191c3a35166311908285cfc187d92567fd95aba7054ea2fdda162ccfff01335c2eba63828884d78133d52dcfc942a7996a803b3e946be0b1a65439f4557b893e1389ba451bad4b0e9683aa6a4584f88f0caf393068ad057721054a7eb2d6c8fb9d79552cf85384831473dd592fe8af14396259191d559356e8cfca0a031a53ab91ee3319fe8930d352fa2d268a6ba65d48b355a654ae92933f2c041bf15a8435e8306f218871b5247e9d24b8e67d84431ecf18c5971c6340dee978949db57fecc95affae1291d1bb3b4802522b18d", 0xf5}, {&(0x7f0000007640)="a0d096c2829bccdae49f3a65c5c979d61a2d5d533b2d9b4036f1e06f28c5734f123fe9174ed8ad701e74084e629db2b27fc219966867fc6343a06bf11b2ed511951fc9abb2fe0f7c94980aa670f24448e955ed4aeb905829966d0c955fe3a7e6240ac7d02a21633c745eb26934bf6cf257a490b1a07ea636b5ad9281fd904ba1ae32bc21aa1a3ea775d85c681a1b19b4012f0010293181a79431f2bffee36d8fed973840352b8c08c0fe3ccfd044f50351e45e6fe78064644b0686c736e29d0abbcb9592860741702869b9812988081fa7060d992c4cda3b1aa7307a39ad013d33954e252fe8df3b15617fc4", 0xec}, {&(0x7f0000007740)="4b3d8519e8", 0x5}, {&(0x7f0000007780)="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", 0x1000}], 0x7}}, {{&(0x7f0000008800)={0xa, 0x4e21, 0xfffffffffffffffb, @dev={0xfe, 0x80, [], 0x26}, 0x6}, 0x1c, &(0x7f00000088c0)=[{&(0x7f0000008840)="a5e59e57ef582c009d50fb2b08e5474d11d4500463fa2553a6426a78b693781aabf3c246c3d0032eb008b305d0fdaed654ab21921a7926cefa54fa0b857d1643b2e3622a1638e01043e2b6b933316990180e", 0x52}], 0x1, &(0x7f0000008900)=[@rthdr_2292={{0x58, 0x29, 0x39, {0x33, 0x8, 0x1, 0x15, 0x0, [@mcast2, @dev={0xfe, 0x80, [], 0x1e}, @dev={0xfe, 0x80, [], 0xe}, @remote]}}}, @dstopts={{0xf8, 0x29, 0x37, {0x29, 0x1c, [], [@hao={0xc9, 0x10, @local}, @enc_lim, @pad1, @jumbo={0xc2, 0x4, 0x200000}, @generic={0x8, 0x65, "bd449c29a09b7923f318c61754fab381e1c99d5c4f01e64a05c7926e3c470c42aa7f0305d249c6aab3f08ace7b9b8a0f6599017b4c6ee461d267925be420a384f24b9fa7d4ab198e227c6185a39a2e0983ba793aaef796090830068b8d061abec840cb24df"}, @jumbo={0xc2, 0x4, 0x3}, @calipso={0x7, 0x48, {0x0, 0x10, 0x2, 0x5, [0xfff, 0x853, 0x44cc, 0x20, 0x4, 0x2, 0x6, 0x415]}}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x986f432839e9d4d7, 0x3, [], [@jumbo={0xc2, 0x4, 0xfff}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}}}, @dstopts={{0x38, 0x29, 0x37, {0x16, 0x4, [], [@calipso={0x7, 0x18, {0x9, 0x4, 0x6, 0xfffffffffffffffe, [0x5c, 0x7c6]}}, @jumbo={0xc2, 0x4, 0x7fffffff}]}}}, @rthdr={{0x88, 0x29, 0x39, {0x29, 0xe, 0x3, 0x2, 0x0, [@empty, @rand_addr="b83f210b0acc39ca55d1aa56f6881f78", @local, @rand_addr="0a5a8aa62e89b59f6c0d15ef74f91bbe", @mcast1, @local, @rand_addr="86c9a28996f3968acbce7c5ad056341c"]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x3a, 0x0, [], [@pad1]}}}], 0x278}}, {{0x0, 0x0, &(0x7f0000008bc0)=[{&(0x7f0000008b80)="845bec5ae8b001355474", 0xa}], 0x1, &(0x7f0000008f80)=[@dstopts_2292={{0xa0, 0x29, 0x4, {0x8d, 0x10, [], [@hao={0xc9, 0x10, @rand_addr="4074f3a7fa6c81df4c2351815c91ae71"}, @jumbo={0xc2, 0x4, 0x2}, @calipso={0x7, 0x30, {0xfffffffffffff000, 0xa, 0x4, 0x4, [0x1, 0xff, 0x3ff, 0xff, 0x400]}}, @pad1, @calipso={0x7, 0x20, {0x9, 0x6, 0x2, 0x1, [0x5, 0x81, 0xff]}}, @enc_lim={0x4, 0x1, 0x2}, @hao={0xc9, 0x10, @ipv4={[], [], @rand_addr=0x8}}]}}}, @rthdr={{0x28, 0x29, 0x39, {0x3a, 0x2, 0x0, 0xcf, 0x0, [@local]}}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr="b61a8b09121716f6b88ee7250e146297", r7}}}, @tclass={{0x14, 0x29, 0x43, 0x57d9}}], 0x108}}, {{&(0x7f00000090c0)={0xa, 0x4e21, 0x724eb027, @ipv4={[], [], @remote}, 0x7}, 0x1c, &(0x7f0000009180)=[{&(0x7f0000009100)="9aa2b579c3ce39d5e2267d167ad8f1614db79e27fe72532913ce0471e75f2a0c4f9cf89b11899d320de1fc5d5142ca440efac85dfe006be4580d83a83f6d8ed38c7da43e14b90d9a23990c837a769f6a9a0761aeb4e9c0a84c9d0ecc5b15ac983506db01c7be1f4720ec0a9dc9b7a7", 0x6f}], 0x1, &(0x7f00000091c0)=[@dstopts_2292={{0x1080, 0x29, 0x4, {0x33, 0x20c, [], [@hao={0xc9, 0x10, @mcast1}, @generic={0x4, 0xf, "fe2b8469c6f957e8aca7c6fd920534"}, @generic={0x5, 0x1000, "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"}, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x38, {0x4c5, 0xc, 0x9, 0xdc8f, [0x7, 0x7, 0x2, 0x7147, 0x1, 0x7f]}}]}}}], 0x1080}}, {{&(0x7f000000a240)={0xa, 0x4e24, 0xffffffffffffffff, @mcast2, 0x3}, 0x1c, &(0x7f000000a440)=[{&(0x7f000000a280)="793c22075fca3699d2e366422e09b53247092094d781ce28a2bd83b603405389f7b8527a886a05c0baef301b5ae4e08473f7f54bcd72d125e1cb189e62d32e228c702f11a2c9b46368e75d82b8e666052fe97e145a40ae825513a3e5faa85fd0186375d4dd6625e4c3a583fcd8305e10392a1294a77bab02856ce35d0242eded0ff4065144059f8600baa22c8a27634cfb40bb6d483062521132c4433e7f892f98c4065d9a0925a8890bf06c613f370958c83a80682a03182e0686d311311d9fe747562c838c60550205f8", 0xcb}, {&(0x7f000000a380)="f51c6dc60f2879363ce6635142b88f096c11adbea431b7767a84bed245f5f0d050a1533a21dbad396f42684d474b712bfa04ec3a77cf2a2956ec0f2632b457b31f454e9906986b8d73b4cf1d77c82ad08c6155c4dfbd32d9e93c9ce54c11a62078b47f434aa62ba7a430555c5782800be5aa5e1519445fc5b447374b98094d71c11965896bd67481d56ff8bb9c22a9f87c068c17307bb83a92c08892f792b4192f9a33a9c9094394a46355095c67702831244406d34e21460fa3", 0xba}], 0x2}}], 0xa, 0x804) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x8000000012}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000780)={{{@in=@empty, @in6=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000008c0)=0xe8) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x1000000000013) 03:10:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000038000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x222100, 0x0) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f00000002c0)="932b72a9aec84a95977fcc750bfd08396259870ede6a5d39ea5d9c54d794e8d2aaaf85ca6465ac90a58ab8c9439af45dcefca2a6d1cd0de1ed8412433c98626d626611fc06afb50fa9b4be3522dcd660f08d4d3eab5a028946e8c9c5e696052de2ab3379689aecf7de58d033364d3aeac39e95e90475e66746e3c403791ded5b292340af3dcad7e1f52ce2c9225327cc158844e63abe07205822c0e6ab11ff7ed37345a705743f4418c9f40c51b8b1a99860d778b98a6cff9d3048439eba0f150e32e34ef2a5030697290fd72082bc8ac6e93ce7fc65e0a578df9cc1cf121eddc785b5589c50cf7169b5d18663d1fe", 0xef) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x0, 0x800) write$P9_RWRITE(r3, &(0x7f0000000000)={0xb, 0x77, 0x2, 0x100000000}, 0xb) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e22, 0x0, @empty, 0x7}}, [0x1, 0xbe0e, 0x2, 0x5, 0x1b75, 0x3, 0x3, 0x3, 0xfffffffffffffffd, 0x837c, 0x4, 0x1f, 0x7fff, 0x31, 0xfffffffffffffff9]}, &(0x7f0000000280)=0x100) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1020004, 0x8031, 0xffffffffffffffff, 0x0) 03:10:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x100, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x6) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f0000000180)={{0x0, @addr=0x8001}, "456e23acfd82e42eee0114d311328465cc26140141208f34e9e2348fcb589750", 0x3}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r3, 0x0, 0x3, 0x400000}}, 0x20) 03:10:16 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000003980)={0x40, 0x3ff, 0x9, 0x1, 0x2, 0x21, 0xd, "bb8bc40e28483634de578efba272e6cbcd972c74", "2ca4745b36459dec406950736febb4efd064848d"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x3, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x200801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000000c0)={0x5, 0x10001, 0x5}, 0xc) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) r3 = syz_open_dev$dmmidi(&(0x7f00000008c0)='/dev/dmmidi#\x00', 0x1, 0x183000) sendmmsg(r1, &(0x7f0000003780)=[{{&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x1, @random="4356f18594c9", 'lo\x00'}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000040)="d04c75fdf0cbc1a8a8ca3d46b7a2a89ed853ad6e44360fcbdc3a95ac877f6d2edfaae2ba578bfc40b3abd4444dba5fe7", 0x30}, {&(0x7f0000000200)="a2ca2cb2a590d10a68d6645e1392b84b26afc8331498a7a8a965e211458799b4255c770d50ece4b3df", 0x29}, {&(0x7f0000000240)="f824c79a2cc530b48f38658a47c46e887322cf03ceb1205754d96a34a57d0a6c2c9816e53e8f292d87d4859456fb8f126b3ad40a873187c5b587940097118d4a484f955d2956dbda7a419bcbf6b84c0ca8145111a39591192444989c7962c4e6fdac3b08482a04e5acf7b5fe1c9462621e589800ce13bcc69b6b461dbf", 0xfffffffffffffed1}, {&(0x7f00000002c0)="ce13539af2ec4c73483ca8655763bb7c317aeba609bcc22ce8dc12189aef48df208510", 0x23}, {&(0x7f0000000300)="0799ec904e41be54dc9867e90abe870fc8aa9df13b3f1270289ec3617a52f170fd44dd4d8fdd961b6f6a186bc69f58f030a6766fef39e998968474f6d814c50c8b368f7949418eabda62f6cc129514ef9aef62b410390d0b81e7d3432cfc3c224a9e5485d1773bc4dd1cb3a109dd", 0x6e}, {&(0x7f0000000380)="27eda75de95c72d394aab2317c6c389b410720ee80c411114917743085eb07bbcaebad2469c08a45e3692a5fffc5", 0x2e}, {&(0x7f00000003c0)="704e5b666491b70e730ba9a4c14c9cf24488bd174dab82fbd217ea549199669bd3e7038b207a3027660f3d80fa199adf865b393500cc1af03d5d3c8497ea7ec0483950511d08d1b4561e391defea19e1bacd4106c708457a03cfbf3144c05a23a8adecc9c9ff1d66fc6f5c0e", 0x6c}], 0x7, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x198}}, {{&(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @broadcast}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="cfa49d8374cb62d9508a6fcf97ff1ba8a6dbb4ca2acc3cff6230c1513c188a9a9719eed489937076af50dea8501d87f0a2f3f8da62bee0ba1a74fed1f103e084cbed32cfd975", 0x46}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f00000007c0)="112c15aa8b2083a3439f791ab9c525ac903dae11bd091cdf6ee6e34110e70679aa72fc2c70ad666bcc6ae05db54c2a51b772bed409a2a8ce4265d30ed0c3dbbfc2acde14eba2aceaa565d92a20787d524741f2e27f7b58c727f6aea16cd3de6c8ba5f31a3a822b2ba0d82263748375885b3432c5fd0d508b7918c863f63a8c1abf705df67c9978453e17", 0x8a}, {&(0x7f0000000880)="242f9817cc314e882fd9b102a105779f3f06a0c5508a49c8d2010020970e20", 0x1f}, {&(0x7f0000003900)="c10464bcdee39bd2a0ca0ab6113dbeaa34ffebb4f7113cca75cbbc128d714b97c0323f8edabc5642e6a8cbf7326e2c20d5014dfa5c05f487502bca874769c5d684246420dae3c5d205b9150a2a4051cd91483894be9a51c525a74453b602df4c8f0f6d6975f0e37684dec7b287c9ecffcc81fa30af3de9b3", 0x78}, {&(0x7f0000000940)="a117382e892131b123ede7e5eb8214d594c7ba76ca1fcdc77c05f5beae985f74f5b394fbd5438378cc8e483280e7d208102c442364f9b5bc0cb776a1d1f1ffe60ac490fb29bfcf517bcd", 0x4a}, {&(0x7f00000009c0)="7491cc66087e87bbed2c955e4d12921bb5916df84ee17978a10d549cb66916edc117978425b7384e82a0e06bf2d90e5108575e93d5864cee67d2846763c806b13e8765a59526a02486be29c372c884b56d45cdd74c8832fbacfe1e393f454510377992d56004f28611a43d7e45ea1f61ae9843391d7ee5ef1db2b5b31094e2bf59b56598238e1a13e3260536f0539ee1edbebc479590324032668e07385c1dc591878095dd26d1774baab713452abb0d43c0de2ae2491b2817561b914a9e117247a0", 0xc2}, {&(0x7f0000000ac0)="f5e07ea6a8225317e6c148a963ceef09c58c67cdff51928337c597244879eb69fc4486e76f992357afcbd5c3864b22c9f16ad0f53763cdcac1938140d7e3281aab9674d431cb7eec7b000d8fde72291b54a9d8725fea6968f0ba615d1b657bc911bd383b4eec68875916009326f1c1a49d348a96c393c2eb6e32d578ff05ffffa964b87a0cc69fa1e5f3325116a9c919199c287fbbf0eec080190f2f850d30ce87144cba1d5b15b5d8be8b4e4e7cebf485348b9dded58b0675c4d163509dbad9b28486b56e3cff7bebc247dff1c3860cfb06db1748e3e4198b263facf875ce84533b663f1d1a8619752693904d9a0d0628", 0x49}, {&(0x7f0000000bc0)="8b3992cf9c6ca1b60eb810980f69f029655077973e25619e1227a263b7cc65a20ac9fc36ddb8c601be6ef92f5b931eaf0693102cd4fcea3e689b30ed4849d49655d90e133a2550b38b39d2ecb5f13751ef67130ab375c3658a79fb614935b7a68555b865d167832264733ae4911ec8a639f4f05f279e53c0d2101810c5e700bbb41a7ab1badafdd29c361d06c8022d4052d04b398d4023d55f09c98ffbd32387cc87933843a868c31d", 0xa9}, {&(0x7f0000000c80)="a1d48954151a3e00529bcea19c7d5b114800b65a0fb9127eccc67fa2e5d3a1a22cd3b62c7e4ac76414c6cc28c1e3724025a1eb583ad6a0c7829c01ce459759acac1f8d9a400b55ad", 0x48}, {&(0x7f0000000d00)="847acfc156b64fe7655d575acb5f855d0c2322fb12f9afcf37e6097f7deffd1b39f948d68e7dff87a3df18610b7afd7f1704aa4b307dcab08ca841ba50d5bfa685bd05038a619bc6843d0dcc6c4a998d72bffe7956bfc0947e4e681e38ce48681092b51b1c07de098d6d81b2b11b26bc64bf836af142c7db5fc8d86c9e271910e7f1537d0071f9ecc7f8cc782724bec29b3abd", 0x93}, {&(0x7f0000000dc0)="4bce7055d7722a7d8f9d841ebf000f7198f864a3209a0ccc0e80fab9882475266fa755534b730f3951384636479806f17947e93f7e822ebab4f9e90618466dcf803b044777406b95cd5aa693a7773fd6b76a7abf", 0x54}], 0xa}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000f00)="2dc1e31ca5dd1cf71ed97786bab5ed17780eb07349d49f488a2eccd5c6ad701992aa9e496b030a05c0730d338aead4ac880e178046844cae0d710ff541c0616cd6b421881303b4f5e0de944ccec2dd71db8ab7463759e1f86f8c5a4576146c9ffa8c8a57c5c8dae49fc3274293dd2adb0ccd04a214526920b8e038baa56ffe77c9a34e2b85f8086edee518f1d67dc4cf8b61e622bda86ae629c40f4a57ee1bcf55ea83d8938fa8f25b08f94c240efd2b376aabc25e29e2244963ebad4fcd4329bdf0acb500a8eae7ccb72a", 0xcb}], 0x1, &(0x7f0000001040)=[{0x28, 0x108, 0x1ff, "2caa0cb04576bc749cba702c2a25b92081dd2fdea9"}, {0x50, 0x115, 0x1, "f01fc128fa4592a0f7ddb1ae404204f7bc4a0b7ac276bac09fd5f751deefc965e87fb212bb2f22790b9429565248d229b462c82f1f70944f0d96eebc"}, {0xf0, 0x3a, 0x202, "f90a8db97f29b04454fdb0cbf8d5d623bc0ee9225049f4462afe5ceecc81a517e8cf91220834376465c4f32203c43af8870a99e66fbce240a7ad2d383bf98f86c7f1ea4efe07dffe51e3895029375e28b8c1a9f8bf9f31cc2a0d9ce7873ff193ee5694c979d79263ec6d341327e315e409fe73d9d55975e5735913e600287543e5b280bc2ab1c16a83f3a7308d679cbaf5b8ded5dfd90cb4930a3657687e6846743df4338ddea62b35863dde0517abd85f87a366f038709d231181184d555702688fa9ae8874337d57233f91c891eca58ae316beb6ddc01fd9"}], 0x168}}, {{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f00000011c0)="47d1f6b57927fa6d774e961eb933f2c24b0d6769af532d", 0x17}, {&(0x7f0000001200)="8fbb6932e5f7e9d36a7e5526dd5b8b678526a590ff3e86a654b02161f76987fbbe77700c2d0b6d0efbda17e433659a2446f57bc7440760ccd6e70931b9a88038040d7d50d09a00a6f8232c900d064e44b1b2eeab482c1a709b9d725c158826829e9196c2392c9fe9192d80ace02844d0de037cc51c8bbf55ccc77053311dc9bdce65a3a082298cf9759d6e655fb13aae4e3eb3aa276a0921108d8d8a2e54d5bded136011c522422af42fa7782d0492ac9b79143c816f3fc4390d8095730063d4a06d66a3156102c67a57f951", 0xcc}], 0x2}}, {{&(0x7f0000001340)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000001440)=[{&(0x7f00000013c0)="5464c3c9c5e4383808820424207f575502ec109998108fc4", 0x18}, {&(0x7f0000001400)="79744ee9af5ba3764667b9fa8419474b8ed20f38ab8bf37bc17b86f08127ce9aaf0e351254648a2f752edaff378245e17b32880bf0", 0x35}], 0x2, &(0x7f0000001480)=[{0x60, 0x105, 0xca, "f34f6fa2cb71c09c222624fe551d9c0d59dc233369896b985de9add23b7dc9a12753432dcdcffe6b33748fe6efd0a58a95838eb0f06968da7ab196935b0c2b48a058e8dc8679ac39ae31fa0b"}, {0x50, 0x115, 0x3, "3c986feeda03d3edef47aafa2f9f488300532d145e965902865727d7edd108b3944ab8f96b003a542c52c659855e40b20405978a882e9222e592da9eba"}, {0x1010, 0x1, 0x8, "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"}, {0x1010, 0x10f, 0x80, "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"}, {0x60, 0xe99535cbd35a9d85, 0x1, "3c6d49e4e28cee47d59939102f657fc804231b6a84e7c1af052bd36ef19520b83946b62cc91a7e5f20ce39a1701c07512f2703da5e2e722488c39489fe51c7bc104a8dc6f695d8fe32bfc37c"}, {0x48, 0xff, 0x1ff, "4fb9ec30a80acc91fb4abdfc7bbf017866ce7bc4265528ff2a04c75899d8f1978ed1ea9857d39dc4ccd4cd90f698d99fcc745d8bc9"}, {0xb8, 0x10e, 0x1, "c4c48e1168c35013270eb9dcff1231a5bc232f3ec35a14e7d24a730b7b7c3928545f35752adae577dcbdf79b9a1f9377fffcf2af36adbc7b35b47e9ed10eac7a032cf2e7b273586b60a1e09f251a3db9d8ebe316718bf37924fe8c3aaade69d742ef92dcefe1948e4dfe89e366fbb349bfd86ce0717e297742afadcca3d4714cc41d3fd840b6315289f5e08773db8e239981eec6a82397eb5922109e283aed2d79"}, {0xc0, 0x108, 0xa, "317b8802f4b12c812f361edeb9a8a32a686059e4449038aa60a564bb76bfaf0744a5085b110a368887de058532e4acf57a787cc516c7f9241600d9c89114ea661dce9168687003ea3e053700a5260b6a1b2b5da9cefa1037d1ad58ef6c2969c8123e6f55e9a9fb39aeb1753a25c91b4225ccc292de2185877084684fb835f3d68021d011891014cbc84584011dc6f7395bb73f9b04b8c28745e71c5d786482077941a28adfb0cc25ddd99b"}], 0x22f0}}], 0x6, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x40000000000008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000003a80)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000003b80)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000003bc0)={r4, 0x1, 0x6, @remote}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000003a00)={0x7, &(0x7f00000039c0)=[{0x0, 0x2, 0xa3e1e95, 0x800}, {0x8001, 0x800, 0x2, 0x10001}, {0x800, 0x3a2, 0x0, 0xc9f}, {0x7285, 0x1, 0x92bc, 0x7}, {0x81, 0x10000, 0x4, 0x7}, {0xaa6, 0x401, 0x4, 0x7}, {0x9, 0x3, 0x1000, 0x1}]}) 03:10:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) [ 172.342912][T10454] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) [ 172.363329][T10451] Unknown ioctl 19250 [ 172.377184][T10451] Unknown ioctl -1060612506 03:10:16 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x200001) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x5, 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x80000000}, {0x1}]}) 03:10:16 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000003980)={0x40, 0x3ff, 0x9, 0x1, 0x2, 0x21, 0xd, "bb8bc40e28483634de578efba272e6cbcd972c74", "2ca4745b36459dec406950736febb4efd064848d"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x3, 0x4) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x200801, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000000c0)={0x5, 0x10001, 0x5}, 0xc) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000100)=0x63, 0x2) r3 = syz_open_dev$dmmidi(&(0x7f00000008c0)='/dev/dmmidi#\x00', 0x1, 0x183000) sendmmsg(r1, &(0x7f0000003780)=[{{&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x1, @random="4356f18594c9", 'lo\x00'}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000040)="d04c75fdf0cbc1a8a8ca3d46b7a2a89ed853ad6e44360fcbdc3a95ac877f6d2edfaae2ba578bfc40b3abd4444dba5fe7", 0x30}, {&(0x7f0000000200)="a2ca2cb2a590d10a68d6645e1392b84b26afc8331498a7a8a965e211458799b4255c770d50ece4b3df", 0x29}, {&(0x7f0000000240)="f824c79a2cc530b48f38658a47c46e887322cf03ceb1205754d96a34a57d0a6c2c9816e53e8f292d87d4859456fb8f126b3ad40a873187c5b587940097118d4a484f955d2956dbda7a419bcbf6b84c0ca8145111a39591192444989c7962c4e6fdac3b08482a04e5acf7b5fe1c9462621e589800ce13bcc69b6b461dbf", 0xfffffffffffffed1}, {&(0x7f00000002c0)="ce13539af2ec4c73483ca8655763bb7c317aeba609bcc22ce8dc12189aef48df208510", 0x23}, {&(0x7f0000000300)="0799ec904e41be54dc9867e90abe870fc8aa9df13b3f1270289ec3617a52f170fd44dd4d8fdd961b6f6a186bc69f58f030a6766fef39e998968474f6d814c50c8b368f7949418eabda62f6cc129514ef9aef62b410390d0b81e7d3432cfc3c224a9e5485d1773bc4dd1cb3a109dd", 0x6e}, {&(0x7f0000000380)="27eda75de95c72d394aab2317c6c389b410720ee80c411114917743085eb07bbcaebad2469c08a45e3692a5fffc5", 0x2e}, {&(0x7f00000003c0)="704e5b666491b70e730ba9a4c14c9cf24488bd174dab82fbd217ea549199669bd3e7038b207a3027660f3d80fa199adf865b393500cc1af03d5d3c8497ea7ec0483950511d08d1b4561e391defea19e1bacd4106c708457a03cfbf3144c05a23a8adecc9c9ff1d66fc6f5c0e", 0x6c}], 0x7, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x198}}, {{&(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @broadcast}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="cfa49d8374cb62d9508a6fcf97ff1ba8a6dbb4ca2acc3cff6230c1513c188a9a9719eed489937076af50dea8501d87f0a2f3f8da62bee0ba1a74fed1f103e084cbed32cfd975", 0x46}], 0x1}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f00000007c0)="112c15aa8b2083a3439f791ab9c525ac903dae11bd091cdf6ee6e34110e70679aa72fc2c70ad666bcc6ae05db54c2a51b772bed409a2a8ce4265d30ed0c3dbbfc2acde14eba2aceaa565d92a20787d524741f2e27f7b58c727f6aea16cd3de6c8ba5f31a3a822b2ba0d82263748375885b3432c5fd0d508b7918c863f63a8c1abf705df67c9978453e17", 0x8a}, {&(0x7f0000000880)="242f9817cc314e882fd9b102a105779f3f06a0c5508a49c8d2010020970e20", 0x1f}, {&(0x7f0000003900)="c10464bcdee39bd2a0ca0ab6113dbeaa34ffebb4f7113cca75cbbc128d714b97c0323f8edabc5642e6a8cbf7326e2c20d5014dfa5c05f487502bca874769c5d684246420dae3c5d205b9150a2a4051cd91483894be9a51c525a74453b602df4c8f0f6d6975f0e37684dec7b287c9ecffcc81fa30af3de9b3", 0x78}, {&(0x7f0000000940)="a117382e892131b123ede7e5eb8214d594c7ba76ca1fcdc77c05f5beae985f74f5b394fbd5438378cc8e483280e7d208102c442364f9b5bc0cb776a1d1f1ffe60ac490fb29bfcf517bcd", 0x4a}, {&(0x7f00000009c0)="7491cc66087e87bbed2c955e4d12921bb5916df84ee17978a10d549cb66916edc117978425b7384e82a0e06bf2d90e5108575e93d5864cee67d2846763c806b13e8765a59526a02486be29c372c884b56d45cdd74c8832fbacfe1e393f454510377992d56004f28611a43d7e45ea1f61ae9843391d7ee5ef1db2b5b31094e2bf59b56598238e1a13e3260536f0539ee1edbebc479590324032668e07385c1dc591878095dd26d1774baab713452abb0d43c0de2ae2491b2817561b914a9e117247a0", 0xc2}, {&(0x7f0000000ac0)="f5e07ea6a8225317e6c148a963ceef09c58c67cdff51928337c597244879eb69fc4486e76f992357afcbd5c3864b22c9f16ad0f53763cdcac1938140d7e3281aab9674d431cb7eec7b000d8fde72291b54a9d8725fea6968f0ba615d1b657bc911bd383b4eec68875916009326f1c1a49d348a96c393c2eb6e32d578ff05ffffa964b87a0cc69fa1e5f3325116a9c919199c287fbbf0eec080190f2f850d30ce87144cba1d5b15b5d8be8b4e4e7cebf485348b9dded58b0675c4d163509dbad9b28486b56e3cff7bebc247dff1c3860cfb06db1748e3e4198b263facf875ce84533b663f1d1a8619752693904d9a0d0628", 0x49}, {&(0x7f0000000bc0)="8b3992cf9c6ca1b60eb810980f69f029655077973e25619e1227a263b7cc65a20ac9fc36ddb8c601be6ef92f5b931eaf0693102cd4fcea3e689b30ed4849d49655d90e133a2550b38b39d2ecb5f13751ef67130ab375c3658a79fb614935b7a68555b865d167832264733ae4911ec8a639f4f05f279e53c0d2101810c5e700bbb41a7ab1badafdd29c361d06c8022d4052d04b398d4023d55f09c98ffbd32387cc87933843a868c31d", 0xa9}, {&(0x7f0000000c80)="a1d48954151a3e00529bcea19c7d5b114800b65a0fb9127eccc67fa2e5d3a1a22cd3b62c7e4ac76414c6cc28c1e3724025a1eb583ad6a0c7829c01ce459759acac1f8d9a400b55ad", 0x48}, {&(0x7f0000000d00)="847acfc156b64fe7655d575acb5f855d0c2322fb12f9afcf37e6097f7deffd1b39f948d68e7dff87a3df18610b7afd7f1704aa4b307dcab08ca841ba50d5bfa685bd05038a619bc6843d0dcc6c4a998d72bffe7956bfc0947e4e681e38ce48681092b51b1c07de098d6d81b2b11b26bc64bf836af142c7db5fc8d86c9e271910e7f1537d0071f9ecc7f8cc782724bec29b3abd", 0x93}, {&(0x7f0000000dc0)="4bce7055d7722a7d8f9d841ebf000f7198f864a3209a0ccc0e80fab9882475266fa755534b730f3951384636479806f17947e93f7e822ebab4f9e90618466dcf803b044777406b95cd5aa693a7773fd6b76a7abf", 0x54}], 0xa}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000f00)="2dc1e31ca5dd1cf71ed97786bab5ed17780eb07349d49f488a2eccd5c6ad701992aa9e496b030a05c0730d338aead4ac880e178046844cae0d710ff541c0616cd6b421881303b4f5e0de944ccec2dd71db8ab7463759e1f86f8c5a4576146c9ffa8c8a57c5c8dae49fc3274293dd2adb0ccd04a214526920b8e038baa56ffe77c9a34e2b85f8086edee518f1d67dc4cf8b61e622bda86ae629c40f4a57ee1bcf55ea83d8938fa8f25b08f94c240efd2b376aabc25e29e2244963ebad4fcd4329bdf0acb500a8eae7ccb72a", 0xcb}], 0x1, &(0x7f0000001040)=[{0x28, 0x108, 0x1ff, "2caa0cb04576bc749cba702c2a25b92081dd2fdea9"}, {0x50, 0x115, 0x1, "f01fc128fa4592a0f7ddb1ae404204f7bc4a0b7ac276bac09fd5f751deefc965e87fb212bb2f22790b9429565248d229b462c82f1f70944f0d96eebc"}, {0xf0, 0x3a, 0x202, "f90a8db97f29b04454fdb0cbf8d5d623bc0ee9225049f4462afe5ceecc81a517e8cf91220834376465c4f32203c43af8870a99e66fbce240a7ad2d383bf98f86c7f1ea4efe07dffe51e3895029375e28b8c1a9f8bf9f31cc2a0d9ce7873ff193ee5694c979d79263ec6d341327e315e409fe73d9d55975e5735913e600287543e5b280bc2ab1c16a83f3a7308d679cbaf5b8ded5dfd90cb4930a3657687e6846743df4338ddea62b35863dde0517abd85f87a366f038709d231181184d555702688fa9ae8874337d57233f91c891eca58ae316beb6ddc01fd9"}], 0x168}}, {{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f00000011c0)="47d1f6b57927fa6d774e961eb933f2c24b0d6769af532d", 0x17}, {&(0x7f0000001200)="8fbb6932e5f7e9d36a7e5526dd5b8b678526a590ff3e86a654b02161f76987fbbe77700c2d0b6d0efbda17e433659a2446f57bc7440760ccd6e70931b9a88038040d7d50d09a00a6f8232c900d064e44b1b2eeab482c1a709b9d725c158826829e9196c2392c9fe9192d80ace02844d0de037cc51c8bbf55ccc77053311dc9bdce65a3a082298cf9759d6e655fb13aae4e3eb3aa276a0921108d8d8a2e54d5bded136011c522422af42fa7782d0492ac9b79143c816f3fc4390d8095730063d4a06d66a3156102c67a57f951", 0xcc}], 0x2}}, {{&(0x7f0000001340)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000001440)=[{&(0x7f00000013c0)="5464c3c9c5e4383808820424207f575502ec109998108fc4", 0x18}, {&(0x7f0000001400)="79744ee9af5ba3764667b9fa8419474b8ed20f38ab8bf37bc17b86f08127ce9aaf0e351254648a2f752edaff378245e17b32880bf0", 0x35}], 0x2, &(0x7f0000001480)=[{0x60, 0x105, 0xca, "f34f6fa2cb71c09c222624fe551d9c0d59dc233369896b985de9add23b7dc9a12753432dcdcffe6b33748fe6efd0a58a95838eb0f06968da7ab196935b0c2b48a058e8dc8679ac39ae31fa0b"}, {0x50, 0x115, 0x3, "3c986feeda03d3edef47aafa2f9f488300532d145e965902865727d7edd108b3944ab8f96b003a542c52c659855e40b20405978a882e9222e592da9eba"}, {0x1010, 0x1, 0x8, "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"}, {0x1010, 0x10f, 0x80, "aefaa4865c54e682675931df3f2282701b0a7962148a934fc1295efdda8b24088fd985b4b68f87803c2af04c46b0a0a3f2a2095bfa055c1e81cf1db46f4667d5dd51fe037cee07d48085c11509146d4e01d25f5adf3b767804ad9bfd0f08213b42de0aad485aac664b3acb819bdd5e4655726476e8f35136d15b7f8696a5e00a98e2125e6453c6040dc7be8582bcd9c00cd5812dd40303e1a3acf9c1802212e6086c501c8530841d2568fc74bc36785e8f2d7c798e763dd3e8e9c8640501524476cebf71799b786ad96df6830516ada4ad5c91fc954a4a8c6f3665ccf53547930946fc4b7a7e83d77bb24dd2bf35a0a5dd2267d6e523a60497efb785f29ce3ad1f0efb840b388c772b6e4f250a7755b7fa65a24648453f602976c779b1ecba751fd7568257af7147ebb61c93c3016a6bceb9e280d943be737e5fde29fe0803217a53772f8bf77eda5621fc81d50a5daae8961c7ca96283a8ea1089b794b498c529bb4fe89361650d0b774e78a59ded0306c1b009cbb52ea74bd166d844c10657e5753ff12da2b16b7faddd300a5e9308a569d7fe879b01c5a760c0bc25248e8cc97f70b255ac6c38cffb36b22d34128cefdae4d1a93ba0f14b57ba23497017dc99670515cf4700938ab6775fb516554d806426141456179043ddc80c306ec17f37fc0fd3cee0ad7e393b944fc0b2ffd3ceca2a1fb2cf5961b99defaed1df515f517204c9d4eaf2de97c6c1e5c063db7a4e73df4479859dcf6c6b86af8b1377193521d5a680638cdcf7e861544bbbea4642ed33c9f09b629c57e6d00418a77a0b97a6f508761f23d17f3dba2cfc1b8f5e1a23974f7fdda7eeb2e33c6d0d48690ca58c1c79d18fe5ea021befc8d91625b4cfa31e637227b1273669752804c9a57cdd8b76679953366bd13b1eac88e464f9faeed03af68ac1333b9d624d7671347159a46d54ed8f6f824b6875cad19273905e28da4fedcc2470e56bf845ba4f6f546afa872c2c56a1ec2b16d85500a8b66c4efedded09207dd1ee093c0d049521ee2f92c28b67da5b245802634bc90a2fce55b82ae3d7d1c1512a32fc1472d39807401ee6b04f36ed7ecab612ace44a3ee08cceec924011bedbc7602ac6e613a752490ee458e0f1f0773d62ef8bc639b72575c61e6bf0cbeffb125db4568a934ef48c3f38ad487473de4ea5b89039b94c582eff7dda2c1d24bac037c2acc8e0c9ae6c15a7a2870c55d25c020846e56300637148d365bf11f00e60ca94a1b5948c458b25267612e46e9cde53fd392a6f357435bf0b4fab57c7b4cab0641db58c06de4c721e5b3175641754371e3758d41c1c07762017b770385a92d420097e69579d4cad106eb153da2fe834e39de3a85375151b0353e25afdecbe91ee1d1707009ce28def0b90bb8cfd7ecc39466c989ec65807914a2769a0038418bf886f5896f84dc56b80904309914c61e42a48845f88e225f090ebf02739d584da5c1dfc26d74891e3bbd941a548913fbfe0dd3b6028b66f23f9aff7823354066f20fa88b8ef21859aec4c9e492837a7ad75098a671cbeb75eea7da1d62c7b3e538a708b189ecb32c951c51efbbb81811c8310a45b18214b59212824dbc13ee2b2945a5d7d358547ef53c84beee8f7c11ee05ca0dacf32bfef16127580c683ae5715e0a57bcd1b2bc8826fce2846f284dc613944ea2002e3c19d39d96317fa91a52c7fc2e1c1a924f0f2a79c5a3a75829cf920a41e26406a118395627a10995e5ce867892430008c839da718c6cf28dc3e77027b01fa8ab2c8e59551eec79be119b0b8a009f86ac55b7ed997ebeb6cfae2901ae3e8f5212815584cb4b4effc45a79f79b7d8c98369521ce68cdd534faddada04d36874d5267feddc57129452cd4cc476fe2990bb79fb8bd30b1cda35b752392a29560ea84b6971be0df0745b34bb1f48a192a83ba567ae216b1fa0e38eeb38d4ae6ba46cb7c4096383fac31bac480296b8f6a42606a43912189b19242d6d79cd1282f3fba3b2df1fb7470046ab18a974aa95670e6b6c388b8554cf6c3b3f90ce2dfda9cc9906f49f9389e97db431a54102f25636aa8649a98eabc01a02d88b907f2652097c8ab00498abba040923528dace9aa4c66e0246804ff5863969886579cfe5af00cdc2ef56ecd90808dfaf304085a4e6da80ef95bfa6943ffb9187285d4bc116f8bdd13ee11f17ec08c0461fa718034a23196c6ac26e49d23e0e38a47cd2deee586bd3477e3799be43ecbf1e2046f4a02c53110a8685491608c14b85c14c481974cc422f4740ea1f3f540c291c121a4d313cbf9b4c89f3dd5405e04a4a72a74cd2b35539e48a4f425bdea0834fb85b43650739e4a09cc8b02db8c263ef7e0ad1449ff5331944cf020934d68018502a4789590fe7e68e07fa7f3212133dbc7531f6d56e9d961b2d00ec0c6af1be7ccc8db95eacb139b4f0a6b9a3741499d1a14a290cbaf6e8550e9a2cd9633e90db4ab9af9cf52fcf280a37c23ea80f2687c1c693c7df399e8cb8207baac792cd3691a86b88e4bfd1db4bf155dee3338ee295c322f4647d3bf1263d4a5e69734669566355f7e84b0484c66005c8625061898c09fb4b52b2926377dfc80c84a146cfd2d7b6824644d3db3a17823b6cd6ce4fffafdcaabc7619630f0727a3ccc59660c2f47f3ca9db9df607a9bd6855ba57ab642cce96c18ad69b79c827cdfd8bc7d71adde20471be07b9bf4a2ff98eedc9d705bdab53d4ff55d9d1e594f9f022467879b260fd4d35e4d6f82a872cc78915893aaf0e1064e0c6edd3bb3631369c3c68302f9871b7755f801955efaf89a5d878b3880a09f4e4f0d5f6ab7b49ccdf93f41411b46caddc80a9f7417104664456c00b04f4dd9ee0a44f3c74f94cd5e2a87cf8a88d6740878edb837be464b7aa7297c36b38cad2ede86073274460230352b455f06b878f0d67e7f2c66ac3176175ab99fe2bf10821c5b03517024af13d1f0c2e52780d81d30287f9a13940720e713c7ee39579619d21bcd332e7217bad6c6326ca30bc406c1cbd930aa8bedc2a016777bba2406b8afaa5d20069f377fcd25af597463b0183f9107db7c660727a6e96c56349b54beff591780326df17af34ce872200cc6e5b84aeffeaa6e08fc17e9e91ee7ea32c9486dee6277e8345e39b3fd67bdbcdabb17acacb27b1268b810ed3a512d2edabac0f9ed275348022d95e33bc188f33fea571c98624643dadac4daec568b1a9afb7214fabf08657947ea47107946df4b5757ebc39aba70b6013af1dbeff7dec04d692abdc7f784f5666273f258cb9e58c0c92d9173ccab884ccd5040e7f0d268e775266822fafddf1a83cc065399b2120c749dfe7f755aa4a17c4e0c2c21a5737106fbaa8655bf0e33f3512d4ea6c8a3943787dae2901da54fa9ff23649ce95397c6d42eaed590222128367cacdb38a8b601fc105e7d8cc43e9765e64f0d2a8fd93f760f035b45b11c94a317e7be5800a2fbb2fb90a4e93b5d5ff246e53dccd3277ce93a6279e73a626223193111b288eba8a8e78a38fc44d9d8f0f6c9512ad48825ce482f2e5beb2435819b1871744aba365ced8f26eb36dfcb063f1677c5433547f53af2b1e546ff424b75136660eef949e296a331d5dd0aa07df2015a4d2e58c6342677feced979c7bdf3d476135615466bc01bc1f01f53eeedab72f86aeca8cd289848276979828c0f925b2ebab030f1159a7f3340612587847d55a172a01c5067644d1442b9ce294cd8940296adec5fbf3269cda13ab55c7087e0db54f6821b3eb94e29934ddb7aee5f2a1d15d92a164600955b07073a7ce1d65e6cebbbc512044d81822da0962e5a4b0ecfe548bf01be1122986266992f5c91513f5471d3bdc8e62902bba41124915fe9f102d295f35519e4ed66a9db78d99fd455186b389606c9ee2a707b11fe88496b2d014213192ca9c4953683910ea1d7cfb4c63249144ddd20fd1766292bb37860223dabfb8037f3e560bae15de92c6a5dfe9829366638440e8c653317be9de5afbd3509450472e7a28a6686ea67010f200351cd160f33921363c31eb5362aaf3466385544c4668bde8c01433d5c79661d76c8b62344ecd4a3e4ac884b6d98fdc335edc9f80714021fbeca44f3c0053bd073c2e417161d862aedc3089d284ec8537e3314c0b0acb186fab2df1b2cbbd550fd85fc4f507e69fb923b228a0682356f107ef830621184c3db26ce1de43b866db343574ebaac4567e2a6955aea5daa3819e2e8a85b98ab7747a80b4d1148f5fbd3459a99692104ef751088d112f5857b0dfece6c34a664477aefae1377e5d75795bcda828a283004094652173525889628b5692dfc0fdd810a3875c51c7298b62cf66527e4bb996dcc9b1c4380025d7b0f8784d2de4dc27d0ad03f0c07b46736da91bd2e144ca115fd768abb6b021a80954d0b0373fdc3b9fe9aa3e9bb754027faa96d9c39ff583cc4d2018689d28ccc7d64c1ff05db8f0678c2b728c95f9958106345902d2e8b00ed97430bb0b4d9b2e3cad82a82d638471a0c16f68bd4c1c1be6bdce2e948f5d9ef73346b2bbe16040aadb5ed64ebfe9d3bf460a90f83d7d6e2b19b4997c75f980694f5f869bdd08903602fb70dec1513081d5cf2ca723e858c106403e714e7d40b9583863c71731210ac6fb0df6ab75ff67c4a04b3e954f267c8c3e1718127e6741b85dd6dc2f3a63ddd7bdc409b4bc96770df8273c777c8eb9a8827f6e339e03dae499a567b5c8ab9fe8b587dfd9f86d37577951c20d7b2937abf1ad8a83beced86e13e94511f94381da5d75bbd11374c8008995d43d2cf47c7962051501dc0d064c4ce9d34d56365a5a4edd42ce4b8f7a62feab3f42f8b65a79a28374ae91c6cacd975c5af0f568d19a94a0314d016667481aa0dc0d5dc03b1e0e75e14e99c0b39c14d203a0927f913afa148742782da33b191e491db8cccc0d0fada398ee349c440cd420c470cc4abaaa35d9ae61d624a88b5fda58e434be87745d4941602d610bb854092c6bcb9a1d014b0999be287ebb0af4112c170970dfbbf2f48654a9a18075186e95965705ff826f2f644030c43386a18f42fa6ea942c358886022e70fccacadf1eff90aad343e3bfa25a808848fc5be34c772fcf5397f47a81ed15965b47898aa29be4b162e7f3c13cefb6db9c9958236ca9b550139f2f008bc21b7e9e983dbfe6dafb84b0f5932f2fd128f8462ae04136ea0159cbcd89a86d99b05413e9b0ed106f3e12e9797875fac7f3ecabb8e12a2de6e9e84b48bd97a42ace8cf130edad28416a2a0fb454e421cde837ae237cc3616203d166b0e8a0a0b1ec55dcb93b63715e59f08ec0d6d56a3f06a501ed0a2cdb645770093cd7d1e99bd4b4a656396ad757710d2312fa1c0cdb310fed074659025385289683ba5da6728a55bb57dc6e5716cb1d4dfa60ab2de5a03ffbc216d45ec03b170ca890ed518e4b98023ca128e87d3207194b3a229e990b4cccee943d1da48ca10fd72af8a77766160cce38cc565e88dc3e03775e32e0e392e160fb73de9502ac74435975e92364d26179071a1712e692ccefe0cb4c54298b5e200c0436aec5950dd7ec76690f0ed642e1805c9dc0a300e5244b8748f46d26cba806d1c4c303b9d1035121b1e7b47aceea4d334ac11e068d23a37ba8dc764f948b8d3180f78832c12f06a402e19e4dfb7cc0b198c5c8a9765485158559a89285c76d2f92fcc3018ab6f820be86acb27f77b3b93b32f2711a543feca2ff0248365163f93fb45a22ee0b710e06a9e66ad13b2881622a4d"}, {0x60, 0xe99535cbd35a9d85, 0x1, "3c6d49e4e28cee47d59939102f657fc804231b6a84e7c1af052bd36ef19520b83946b62cc91a7e5f20ce39a1701c07512f2703da5e2e722488c39489fe51c7bc104a8dc6f695d8fe32bfc37c"}, {0x48, 0xff, 0x1ff, "4fb9ec30a80acc91fb4abdfc7bbf017866ce7bc4265528ff2a04c75899d8f1978ed1ea9857d39dc4ccd4cd90f698d99fcc745d8bc9"}, {0xb8, 0x10e, 0x1, "c4c48e1168c35013270eb9dcff1231a5bc232f3ec35a14e7d24a730b7b7c3928545f35752adae577dcbdf79b9a1f9377fffcf2af36adbc7b35b47e9ed10eac7a032cf2e7b273586b60a1e09f251a3db9d8ebe316718bf37924fe8c3aaade69d742ef92dcefe1948e4dfe89e366fbb349bfd86ce0717e297742afadcca3d4714cc41d3fd840b6315289f5e08773db8e239981eec6a82397eb5922109e283aed2d79"}, {0xc0, 0x108, 0xa, "317b8802f4b12c812f361edeb9a8a32a686059e4449038aa60a564bb76bfaf0744a5085b110a368887de058532e4acf57a787cc516c7f9241600d9c89114ea661dce9168687003ea3e053700a5260b6a1b2b5da9cefa1037d1ad58ef6c2969c8123e6f55e9a9fb39aeb1753a25c91b4225ccc292de2185877084684fb835f3d68021d011891014cbc84584011dc6f7395bb73f9b04b8c28745e71c5d786482077941a28adfb0cc25ddd99b"}], 0x22f0}}], 0x6, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x40000000000008) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000003a80)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000003b80)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000003bc0)={r4, 0x1, 0x6, @remote}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000003a00)={0x7, &(0x7f00000039c0)=[{0x0, 0x2, 0xa3e1e95, 0x800}, {0x8001, 0x800, 0x2, 0x10001}, {0x800, 0x3a2, 0x0, 0xc9f}, {0x7285, 0x1, 0x92bc, 0x7}, {0x81, 0x10000, 0x4, 0x7}, {0xaa6, 0x401, 0x4, 0x7}, {0x9, 0x3, 0x1000, 0x1}]}) 03:10:16 executing program 4: 03:10:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11d3a50d5e0bcfe47bf070") r3 = dup(r0) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x8, 0x3, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0x6}) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4, 0x0, 0x2b}, 0x0, @in, 0x0, 0x4}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x28e, 0x0) 03:10:16 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x4000) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_IRQFD(r2, 0x4010ae67, &(0x7f0000000040)={r4, 0x7, 0x0, r3}) prctl$PR_SET_FP_MODE(0x2d, 0x1) [ 172.412393][T10466] Unknown ioctl 19250 [ 172.417033][T10451] Unknown ioctl -1060612506 03:10:16 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c784512634c060cfb6b72c3c9"], 0x27) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='o'], &(0x7f0000000080)='keyringcpusetproc%posix_acl_access/\x00', 0x24, 0x3) [ 172.535297][T10475] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 03:10:16 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "b38301df25a6ef6bd116304415293c5392df103595a96be377a0b227dd230cac80c2b65bab763f327d921056ecf411fba7d3d79ac94a9b310c8a0d19bfc158e11d6c28abf32afddacd73f748f849a8a1f1eca901401ea4b29e98ebeb88311067bc7c2018293687a182d417fc2360062a559a3b71d3676050e842fb0053daa6e0ae9537b2ce2f245e83c884396e63b0c47bd99d3899f83c6cbc80dc767b856b2f185caf210767b6d47b819a763d66edeff57451d5526ef38a1e0b27654473eb019eea6964ed9bd05614d34def63148081788dc415"}, 0xe4) 03:10:17 executing program 2: syz_mount_image$nfs4(&(0x7f0000000280)='nfs4\x00', &(0x7f00000002c0)='./file0\x00', 0x19b, 0x4, &(0x7f0000000600)=[{&(0x7f0000000300)="98b922d88e8d459c9ff1b8a7e274acbee43cae8ba223e08a2ecd57a07ac55973d6984d86c866eac71ca1d286a16142edd114d8cc1e4f56e48f8af887bc69ede9555709df76ef148e9619720466409c56d0d8775475506673760073616e642d106de51c76af75fbebc85a5db7cba4b7a0744b72c3bcbd38c8de620a40e0dfdb0251aa6b0e933acac67ce7bc966bc8f0bdfeec35ddf478ecd72689eb9d5a2f12f7a299daa8381e40187dc933f7dab9bc3dab4215b23b39c21e888a7f314db1c117fbeaacf4214a38bc01cb3766fcd682cf8d8affd4c9adc96583d2a935", 0xdc}, {&(0x7f0000000400)="50b6e24b7ad0e6bbbc18466b920c16602cde9f10691b2777981e80147bc3816acf9f298a4dd9014fafb888dfa830503eebe6505275a84471670c9f3a7c25c629b62fc77429570db6ab6e2ee7a0e799554fccb9a952eea7b10471c35abb61c6e4ed95ba552caab0cb655d0e1e4fb320d42040ea28483db6585cbe95224e3e116678e773249b9c76caeffab22b22f0671684e4786ed864c4db8582ce3b7a3d22ae4670b6", 0xa3, 0x4b}, {&(0x7f00000004c0)="6fe33d29e68db3b95cdfa6225519258685e4d185e635c9a2375f318fa4565b369bd624f966ae6f65c86c253b94f0a7b5139cb60c5f92a66cbcb0305679221dfd8c4590d8ee5091a6065fb26af28af01156396fa6bc183872c66645188b3ca21c1192e031530d7a6fa9087ea74311b08a71413bcd8be19673cab1c7d01cf2f7c29351c5430d0a77eca9936a6366756a09", 0x90, 0x7}, {&(0x7f0000000580)="dab05578e15470a844f61d93db5d604afea81ced9c3c297c468ac1b2e2956aa5a29db9408ff1c691733dbdb9b51cb5c1b2e5f44310ab8f32ebb708d5f963ae8586c739f65e3bd16a54078bec9c099cc7fe5369f41645b55425", 0x59, 0x8}], 0x42002, &(0x7f0000000680)='\x00') openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x20000, 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) r1 = gettid() waitid(0x0, r1, &(0x7f00000000c0), 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0xc) fallocate(r0, 0x20, 0x0, 0xfffffeff000) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000200)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x3) r2 = open(0x0, 0x141042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xffffffffffffff3a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x80000000000, 0x7ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) fallocate(r2, 0x6, 0x43a6b095, 0x4) get_thread_area(&(0x7f0000000280)={0x14, 0x20100000, 0x0, 0x0, 0xfffffffffffffffe, 0x7fff, 0x2, 0x0, 0x8001}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x2000000000000000) fallocate(r3, 0x0, 0x40000000, 0x10000101) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x200, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x3) setxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaacb3, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 03:10:17 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "b38301df25a6ef6bd116304415293c5392df103595a96be377a0b227dd230cac80c2b65bab763f327d921056ecf411fba7d3d79ac94a9b310c8a0d19bfc158e11d6c28abf32afddacd73f748f849a8a1f1eca901401ea4b29e98ebeb88311067bc7c2018293687a182d417fc2360062a559a3b71d3676050e842fb0053daa6e0ae9537b2ce2f245e83c884396e63b0c47bd99d3899f83c6cbc80dc767b856b2f185caf210767b6d47b819a763d66edeff57451d5526ef38a1e0b27654473eb019eea6964ed9bd05614d34def63148081788dc415"}, 0xe4) 03:10:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='mounts\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x0}, {}]}) r3 = msgget$private(0x0, 0x40) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) r5 = getegid() r6 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000440)={{0x991, r4, r5, r6, r7, 0x20, 0x6}, 0xfffffffffffffff9, 0x3f, 0xfffffffffffffff9, 0x6, 0x1ff, 0x8000, r8, r9}) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x200) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f00000000c0)={r2, &(0x7f0000000180)=""/204}) 03:10:17 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x40400) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f00000001c0)={0x1, r2}) r3 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r3, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000200)={&(0x7f0000000140)={'sha1-generic\x00\x00\x00\xc0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00'}}) 03:10:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000380)='./file0/file0\x00', 0x3) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="40000000060050380008000000000000000000010000000000020017000000000000002665744831707070302e2473656c6676626f786e65743000fdddeac79d07ed219cfb9eefe19360599025234adc2f35838f450919d75697a881ca1d8eefac89094f16500121f0eef0"], 0x6b) truncate(&(0x7f0000000180)='./file0/file0\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup3(r2, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = dup(r4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001300)) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f0000000240), 0x4) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) setsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f00000000c0), 0x4) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x2000000a, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x800000000, @loopback, 0x2}, 0x1c) r6 = open(&(0x7f00000002c0)='./bus/file0\x00', 0x20141042, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000140)=0x19, 0x4) ftruncate(r6, 0x80080) sendfile(r5, r6, 0x0, 0x2008000fffffffe) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x1000000, 0x2812, r7, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc65}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RVERSION(r7, &(0x7f0000000100)=ANY=[@ANYRES32=r4], 0x4) creat(&(0x7f0000000200)='./file0\x00', 0x2) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:10:17 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0xa30000, 0x1, 0x0, [], &(0x7f0000000140)={0x0, 0x0, [], @p_u8=0x0}}) [ 173.304297][T10519] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:10:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1e1, 0x200000) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x3f, 0x6, [0x3ff, 0x7fff, 0x7f, 0x3, 0x62f], 0xcaf}) 03:10:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400000, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = getpgrp(0xffffffffffffffff) wait4(r1, 0x0, 0x1000000, &(0x7f0000000000)) 03:10:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1e1, 0x200000) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x3f, 0x6, [0x3ff, 0x7fff, 0x7f, 0x3, 0x62f], 0xcaf}) 03:10:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a5eac21a120000001a170fc05cc71ebca02503e13a5db0950e58b0e38aba401e2a9cf2284f9d619f81e08b49fdde56e09cf2abd8fbad5f17f28e1508c5061a10", "b0534be5a87cbb6f03b8d49394688e77aa140bda57a83d803f805c75ac2784f2"}) socket$nl_crypto(0x10, 0x3, 0x15) [ 173.694734][ T26] audit: type=1400 audit(1566702617.486:43): avc: denied { create } for pid=10552 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 173.696483][T10547] EXT4-fs (loop2): Unrecognized mount option " " or missing value [ 173.777849][T10547] EXT4-fs (loop2): failed to parse options in superblock: [ 173.807543][T10547] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 173.818538][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 173.824331][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 173.834057][T10547] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 173.848572][T10547] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 173.867542][T10547] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 3878579883)! [ 173.879500][T10547] EXT4-fs (loop2): group descriptors corrupted! [ 174.272823][T10531] EXT4-fs (loop2): Unrecognized mount option " " or missing value [ 174.281119][T10531] EXT4-fs (loop2): failed to parse options in superblock: [ 174.301199][T10531] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 174.316973][T10531] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 174.327327][T10531] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 174.337335][T10531] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 3878579883)! [ 174.348895][T10531] EXT4-fs (loop2): group descriptors corrupted! [ 174.355554][ T26] audit: type=1800 audit(1566702618.146:44): pid=10547 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16559 res=0 [ 174.379111][ T26] audit: type=1800 audit(1566702618.176:45): pid=10525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16559 res=0 03:10:19 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c784512634c060cfb6b72c3c9"], 0x27) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='o'], &(0x7f0000000080)='keyringcpusetproc%posix_acl_access/\x00', 0x24, 0x3) 03:10:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000001c00)="11dca5055e0bcfe47bf070") writev(r0, &(0x7f0000000500)=[{&(0x7f00000000c0)="0ff6d67298d34f98e1393a4ec6a4f7ffb6a0900514e840ab3bf03fa6d7fe08b023dd17bd5a7a5a2b5cd89b127d74268ee265066dab3034bf33e666cd95ba760572a94f4e99d1f4be3d8cf3311bd5abe65121a4592f67155c80b381e63a02c5b6d8510c5377d3ff91014b5896b4eea5ecf6f6f77f0b384fc84be0b40cdac5d7f884c51586224302924beb", 0x8a}, {&(0x7f0000000180)="1e67bc6bc40fd89697213f52c2f66220bf074c6884bae9bcc8d1431e99a8ea4a1b7f0ea86b8334b2c39b6b59ec81eabaa4aba579585b14ceb7f33f3cf7cd4e72abb02594f4093564a8c7db439d1d204379668161841d6a4300e1ae272d", 0x5d}, {&(0x7f0000000200)="b0e0b7408947a5dd2ccca343fd7b9461386c336cab8133b01ac0f0b5db12f00afb352fb2682958cf2b1fc2e1722c7f280a1cccc6652d3e224ca6fb38ebb9f3adc822470de7c6a652c9be274a4a25d8c157d3969d560b86cc5aa28e9c7bdf67acb5f8c1be36284ad4f9ef7c389c55f4bade9908e2d353d315178ca681ed590a808c20828a1cba6a9a6ecfd7400b469fda55cc98f9ae69c51d107b193e57abde754a4207f1fdd322e6b2693002e6e5d6ea38ec1b3ac305b5173d9a939f8bffd5a8e6e69846b2030b51d9b3a40e7b83", 0xce}, {&(0x7f0000000300)="0409bb5df9abe5f1bef9709959ebbc23fc539e63504fa1b3d7429e5e2bac20254a27e9b7a61069f4a2040fa9c78895633c641d62b2773b5dc319d7194f7ada16b8952ab554127527b70ca147a8d6e5da894b3d36cf8d8975956b1d5efad212d3ab12f0fbce9035fb4178a1ea9426ac840e4fc8a9eb4e6cb9b5fc797429d51408b63820ee9f1d2587c112cd96ef3e29574c9430226bdddbc68780be97f40363053f07b795a9c11e2392d0b672ea1c98b1de4fa873d868bc56c3c896c193", 0xbd}, {&(0x7f00000003c0)="3d445fa2da15e4f5992cafdb1dc31301e4affe001b14f652d0afffa4244099ec4fb5b1414c6df4da71a7bcf51701ac951f3e3ddf1d351d2c9a1a4720723ad76d9cbfe952057bdf506ab4ef661238c4e6a9fa00b3dc05e434b90ada24a533b1941c8119b3ea7393a345222e65b789ca87e2b5ecf8903da78a33f5c6050ce7479cafa4e8d74c6e400da0", 0x89}, {&(0x7f0000000480)="0499955a256101ade907d5119311f82331637b918003a4994b9d447cb5d162ebac6d7dc3f94006f9313338fcd68415bf0bd79f13066fd3e5132e4f4d67dd2a9302f786f4c0f6c167947d49f22a040f492a5077958bb840b2561cf79bb73d5bd188fffe9934f26fe1ed79ec3de67342e2f21326b57ea4b5d6b1fab46251fbb350", 0x80}], 0x6) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff02c}, {0x80000006}]}, 0x10) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x4) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7fffffff, 0x282) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000580)=r2, 0x4) 03:10:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = creat(0x0, 0x0) epoll_create(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000a000)={0x0, 0x0, 0x0}, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) creat(0x0, 0x0) epoll_create(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000a000)={0x0, 0x0, 0x0}, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x9, {{0x2, 0x4e24, @rand_addr=0x3}}, 0x1, 0x3, [{{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e24, @remote}}, {{0x2, 0x4e20, @local}}]}, 0x210) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:10:19 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) prctl$PR_SET_THP_DISABLE(0x29, 0x5) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x440801, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000796000/0x4000)=nil, 0x4000, 0x1000000, 0x100010, r1, 0x8000000) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000727000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) 03:10:19 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "b38301df25a6ef6bd116304415293c5392df103595a96be377a0b227dd230cac80c2b65bab763f327d921056ecf411fba7d3d79ac94a9b310c8a0d19bfc158e11d6c28abf32afddacd73f748f849a8a1f1eca901401ea4b29e98ebeb88311067bc7c2018293687a182d417fc2360062a559a3b71d3676050e842fb0053daa6e0ae9537b2ce2f245e83c884396e63b0c47bd99d3899f83c6cbc80dc767b856b2f185caf210767b6d47b819a763d66edeff57451d5526ef38a1e0b27654473eb019eea6964ed9bd05614d34def63148081788dc415"}, 0xe4) 03:10:19 executing program 2: syz_mount_image$nfs4(&(0x7f0000000280)='nfs4\x00', &(0x7f00000002c0)='./file0\x00', 0x19b, 0x4, &(0x7f0000000600)=[{&(0x7f0000000300)="98b922d88e8d459c9ff1b8a7e274acbee43cae8ba223e08a2ecd57a07ac55973d6984d86c866eac71ca1d286a16142edd114d8cc1e4f56e48f8af887bc69ede9555709df76ef148e9619720466409c56d0d8775475506673760073616e642d106de51c76af75fbebc85a5db7cba4b7a0744b72c3bcbd38c8de620a40e0dfdb0251aa6b0e933acac67ce7bc966bc8f0bdfeec35ddf478ecd72689eb9d5a2f12f7a299daa8381e40187dc933f7dab9bc3dab4215b23b39c21e888a7f314db1c117fbeaacf4214a38bc01cb3766fcd682cf8d8affd4c9adc96583d2a935", 0xdc}, {&(0x7f0000000400)="50b6e24b7ad0e6bbbc18466b920c16602cde9f10691b2777981e80147bc3816acf9f298a4dd9014fafb888dfa830503eebe6505275a84471670c9f3a7c25c629b62fc77429570db6ab6e2ee7a0e799554fccb9a952eea7b10471c35abb61c6e4ed95ba552caab0cb655d0e1e4fb320d42040ea28483db6585cbe95224e3e116678e773249b9c76caeffab22b22f0671684e4786ed864c4db8582ce3b7a3d22ae4670b6", 0xa3, 0x4b}, {&(0x7f00000004c0)="6fe33d29e68db3b95cdfa6225519258685e4d185e635c9a2375f318fa4565b369bd624f966ae6f65c86c253b94f0a7b5139cb60c5f92a66cbcb0305679221dfd8c4590d8ee5091a6065fb26af28af01156396fa6bc183872c66645188b3ca21c1192e031530d7a6fa9087ea74311b08a71413bcd8be19673cab1c7d01cf2f7c29351c5430d0a77eca9936a6366756a09", 0x90, 0x7}, {&(0x7f0000000580)="dab05578e15470a844f61d93db5d604afea81ced9c3c297c468ac1b2e2956aa5a29db9408ff1c691733dbdb9b51cb5c1b2e5f44310ab8f32ebb708d5f963ae8586c739f65e3bd16a54078bec9c099cc7fe5369f41645b55425", 0x59, 0x8}], 0x42002, &(0x7f0000000680)='\x00') openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x20000, 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) r1 = gettid() waitid(0x0, r1, &(0x7f00000000c0), 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0xc) fallocate(r0, 0x20, 0x0, 0xfffffeff000) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000200)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x3) r2 = open(0x0, 0x141042, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xffffffffffffff3a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x80000000000, 0x7ff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) fallocate(r2, 0x6, 0x43a6b095, 0x4) get_thread_area(&(0x7f0000000280)={0x14, 0x20100000, 0x0, 0x0, 0xfffffffffffffffe, 0x7fff, 0x2, 0x0, 0x8001}) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x2000000000000000) fallocate(r3, 0x0, 0x40000000, 0x10000101) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x200, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pkey_alloc(0x0, 0x3) setxattr$system_posix_acl(0x0, &(0x7f0000000140)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaacb3, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 03:10:19 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x43bb37542ff515fc) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7}, 0x7) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xe8, r1, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x78b}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x401}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x40000000000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x101}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x10000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000000}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x82}]}, 0xe8}}, 0x20000004) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0xba, 0xf7, 0x3, 0x2, 0x3, 0x3e, 0x7, 0x1d3, 0x40, 0x2b0, 0x0, 0x7, 0x38, 0x2, 0x0, 0x3, 0x6}, [{0x2, 0x80, 0x2, 0x0, 0x1, 0x4, 0x4, 0x8}], "ec501cbf54308e97cc93c8ebe2f7ad099a27db00e52edd47a13adc7723d2855d4f8b13673ff7790ddc0e3f8aeaab167a09a401ffcb4bb71f102b01e1c9ef0f3fdf928c07d49b56a49bd3aaab24ee3e7123742eb6875ed7089f973404464ea0241eb3695ecb70dd26c949af64f13acb436eb3a0b5ea7a6614dd36677bc7a571e661aef619a0041fe36fd6369865a3969baa43f9b40d1d2d2e8283bf954675e9f96f89107269dd9bd0357c043d4ec9b6baa19682dbd786ddfa19ee72407da3c57e6f4ce60e4e9c86c69c07cda94c4fca5acaab97a3913d2015e837e1f5e0fb9627ccd3165c65f3f300b2", [[]]}, 0x261) 03:10:19 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008004}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020a040310000000fdffffff0000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000002001000000004d6000004d3000000000200010000000000000000fd0000000005000500000000000a000000000000007412e29944b36651ad3abc150085f546ff0200362585c3d52a0cefb0fcec4dd7c8de23000000000000000000000000010000000000000000"], 0x80}}, 0x0) [ 175.898496][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 175.904325][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:10:19 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008004}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="020a040310000000fdffffff0000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000002001000000004d6000004d3000000000200010000000000000000fd0000000005000500000000000a000000000000007412e29944b36651ad3abc150085f546ff0200362585c3d52a0cefb0fcec4dd7c8de23000000000000000000000000010000000000000000"], 0x80}}, 0x0) [ 176.012755][T10606] EXT4-fs (loop2): Unrecognized mount option " " or missing value [ 176.037989][T10606] EXT4-fs (loop2): failed to parse options in superblock: 03:10:19 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x100, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x1}, 0xfffffffffffffec2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mount$9p_tcp(0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 176.105098][T10606] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 176.220608][T10606] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 03:10:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x2000000000004) writev(r0, &(0x7f000072eff0)=[{&(0x7f0000000080)="480000001500257f09004b01fcfc8c860a0600000017e006000a2b61d2a1f25b15147344d739b3f9f600e30900000000000000000000ffff5bf109000000ed5e0000008e0d861500", 0x42a}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), 0x4) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000040)={0x2}) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000140)={0x0, @bt={0xe3b8, 0x3, 0x1, 0x1, 0x6, 0x9, 0x6, 0x40, 0x8, 0xc2b, 0xffff, 0xfff, 0x8, 0x7d3, 0x1, 0x20}}) [ 176.263200][T10606] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 176.274554][T10606] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 not in group (block 3878579883)! [ 176.285793][T10606] EXT4-fs (loop2): group descriptors corrupted! 03:10:20 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000100)={0x1, {0x0, 0x989680}, 0x100000001, 0x20}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x39, 0x39, 0x6, 0x14, 0x6, 0x42f7, 0x3, 0x19}) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x87, 0x1, 0x3}}, 0x14) 03:10:22 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0xc00, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x8) flock(r1, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @dev}}}, 0x90) 03:10:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x840030, &(0x7f0000000100)=ANY=[@ANYBLOB="2c646566636fa88f6e746778743db15986d35a3e026c4fe4eb48f4513dd3d7ed8f60aaf17b53b5e28c548b0fcab9db216a053acfcb1628f28cb52f1646b7b484b69eb1cbcef8afd9893d48b2ea4145981630a67d03df5b2678c63f8a34b880963af99ee1b8c118"]) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000080)) 03:10:22 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) write$selinux_load(r1, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "b38301df25a6ef6bd116304415293c5392df103595a96be377a0b227dd230cac80c2b65bab763f327d921056ecf411fba7d3d79ac94a9b310c8a0d19bfc158e11d6c28abf32afddacd73f748f849a8a1f1eca901401ea4b29e98ebeb88311067bc7c2018293687a182d417fc2360062a559a3b71d3676050e842fb0053daa6e0ae9537b2ce2f245e83c884396e63b0c47bd99d3899f83c6cbc80dc767b856b2f185caf210767b6d47b819a763d66edeff57451d5526ef38a1e0b27654473eb019eea6964ed9bd05614d34def63148081788dc415"}, 0xe4) 03:10:22 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000100)={0x5}) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0x80000001) r1 = getpgid(0x0) migrate_pages(r1, 0x1, &(0x7f0000000000)=0x10000, &(0x7f0000000040)=0x1) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000080)) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000140)="f2b8b199f907d3d98e7fb3213207b2bd1136b74da279bc5fcabd434729592fbaa23aab6b361b53638a4fd8a6292d7e2290c835") 03:10:22 executing program 2: prlimit64(0x0, 0xf, &(0x7f0000000280)={0x9, 0xe7}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) unshare(0x0) sync() 03:10:22 executing program 0: socket$kcm(0x2b, 0x5, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) write$ppp(r0, &(0x7f0000000200)="8b65d38ad1bcd8ebbad8ae11d61fd56aa879fc49c6c32c4c0b71d5faf5d82fd0c7589f3c0a9cc47942f8c4fb10d5e278a6c377a25219427b55b26671ee45b0596e090d3f3c9e538d20bcb85e5ada3389dcc544d05b71f7a48a898b032a5243ce74956bf4c84c27bf7cb1980bd1d116f29fd8ea7348a64b21f5ab63a615622660596b77065becec054164c2c873dab01ccd30dc72e02e2793a2b22c1b0ee692c7a4742827d6f06ff3cef26a70a5119d0366227dd668bcd16561bfcb0f39f615189e9c138b74ea682163e40a1d826f988b1f7a5bb8ecad30399c2db25858b99e851e93a5b37cb3e392", 0xe8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0, 0x129}, 0x20) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) 03:10:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb432, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r0 = semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000040)=""/250) 03:10:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) epoll_create1(0x80000) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000400)=0x0) write$cgroup_pid(r2, &(0x7f0000000080)=r3, 0x12) flistxattr(r0, &(0x7f00000063c0)=""/4096, 0xbc5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001380)={@local, 0xff, 0x0, 0x0, 0x2, 0x10000}, 0x20) connect$pppoe(r1, &(0x7f0000000380)={0x18, 0x0, {0x0, @random="ba506d6b3abe", 'sit0\x00'}}, 0x1e) r4 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x404002, 0x4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r4, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8400020}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xc4, r5, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800000}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc4b}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7438, @mcast1, 0xce}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000440)={0x100000000, 0x1, {0x3, 0x2, 0x3, 0x1, 0x6}}) 03:10:22 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x7) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x32e) 03:10:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000001000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, r2, 0x200, 0x70bd29, 0x3ff, {}, [@TIPC_NLA_NET={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x20048004}, 0x80) 03:10:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x840030, &(0x7f0000000100)=ANY=[@ANYBLOB="2c646566636fa88f6e746778743db15986d35a3e026c4fe4eb48f4513dd3d7ed8f60aaf17b53b5e28c548b0fcab9db216a053acfcb1628f28cb52f1646b7b484b69eb1cbcef8afd9893d48b2ea4145981630a67d03df5b2678c63f8a34b880963af99ee1b8c118"]) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000080)) 03:10:22 executing program 4: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8041, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x3a, 0x8, 0x9, "faa949c97319179b9b24f58a96c435de3811ea305f2ef7a06524dc02c2c7b40bac3da8b2865bd5960ff79f309c04519e6e6ca470e83ac78d5293"}) [ 178.906675][ T26] audit: type=1400 audit(1566702622.696:46): avc: denied { map_create } for pid=10665 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 178.989721][T10669] sp0: Synchronizing with TNC 03:10:22 executing program 3: syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0xc80, 0x4) r2 = creat(&(0x7f0000000040)='./file0\x00', 0xd2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xfffffffffffffffd}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000180)=r3, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) [ 179.018066][ T26] audit: type=1400 audit(1566702622.696:47): avc: denied { map_read map_write } for pid=10665 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:10:22 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x881) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) sched_setaffinity(r2, 0x8, &(0x7f00000000c0)=0x6) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x20280) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000040)) recvfrom(r0, 0x0, 0x0, 0x10000, 0x0, 0x0) [ 179.169137][T10669] sp0: Synchronizing with TNC 03:10:23 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:23 executing program 0: clone(0x41fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000200)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) ptrace(0x10, r0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) 03:10:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) epoll_create1(0x80000) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000400)=0x0) write$cgroup_pid(r2, &(0x7f0000000080)=r3, 0x12) flistxattr(r0, &(0x7f00000063c0)=""/4096, 0xbc5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001380)={@local, 0xff, 0x0, 0x0, 0x2, 0x10000}, 0x20) connect$pppoe(r1, &(0x7f0000000380)={0x18, 0x0, {0x0, @random="ba506d6b3abe", 'sit0\x00'}}, 0x1e) r4 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x404002, 0x4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r4, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8400020}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xc4, r5, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800000}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc4b}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7438, @mcast1, 0xce}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000440)={0x100000000, 0x1, {0x3, 0x2, 0x3, 0x1, 0x6}}) 03:10:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x100, 0x0) r2 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r2, &(0x7f0000000080), 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0xab91ad8cf93204, 0x0) poll(&(0x7f0000000000)=[{r1}, {r2}], 0x2, 0x0) 03:10:23 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$sock_int(r0, 0x1, 0x3, 0x0, &(0x7f0000000100)) r1 = accept4(r0, &(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @empty}}, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) fsetxattr$security_evm(r1, &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "d38de65b23f225a258986f96ee568d91dbee4a77"}, 0x15, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80000, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x6, &(0x7f00000002c0)=0x10001, 0x4) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000180)={r2, 0x807f}, 0x8) 03:10:23 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x2, @remote, 0x4e20, 0x1, 'wlc\x00', 0xafab93b56bb41d54, 0xff, 0x10}, {@multicast1, 0x1fb, 0x1, 0x7, 0x9, 0xff}}, 0x44) listen(r0, 0x3) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4000, 0xa9) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x2000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x108000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x4c, r2, 0x800, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb67d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x332}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x328}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x5}, 0x90) [ 179.786603][ T26] audit: type=1804 audit(1566702623.576:48): pid=10674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir567686820/syzkaller.PkCgWx/10/file0" dev="sda1" ino=16606 res=1 03:10:23 executing program 4: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8041, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x3a, 0x8, 0x9, "faa949c97319179b9b24f58a96c435de3811ea305f2ef7a06524dc02c2c7b40bac3da8b2865bd5960ff79f309c04519e6e6ca470e83ac78d5293"}) [ 179.851901][T10729] IPVS: set_ctl: invalid protocol: 2 172.20.20.187:20000 03:10:23 executing program 1: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8041, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)={0x3a, 0x8, 0x9, "faa949c97319179b9b24f58a96c435de3811ea305f2ef7a06524dc02c2c7b40bac3da8b2865bd5960ff79f309c04519e6e6ca470e83ac78d5293"}) [ 179.934140][ T26] audit: type=1804 audit(1566702623.616:49): pid=10674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir567686820/syzkaller.PkCgWx/10/file0" dev="sda1" ino=16606 res=1 [ 180.058492][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 180.064326][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 180.134165][T10731] IPVS: set_ctl: invalid protocol: 2 172.20.20.187:20000 03:10:24 executing program 3: getuid() lstat(0x0, 0x0) r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7c8700"], 0xe) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 03:10:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x28c) unshare(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') splice(r0, 0x0, r2, 0x0, 0x8120000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 03:10:24 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffffffffffff3511, 0x103000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0xb6, @dev={0xfe, 0x80, [], 0x27}}, {0xa, 0x4e22, 0x8, @remote, 0x1000}, 0x4f, [0x5, 0xa11, 0xfffffffffffffffd, 0x0, 0x401, 0x1, 0x40, 0x632]}, 0x5c) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f00000002c0)=@v2={0x0, 0x0, 0x5, 0x2, 0xd7, "dad7ad5608b3ea99e3e3f1256e7bd49aa5272565c24dd70fc5592ffe3ad70083ca8b052482266b8a4098333286fa2157f645e9630b58938e07d50f3a4d7fd78da00cb97fc522f0a649571e40af3ca75c95a00fab3d5d0d11a12b97a0505343c346882716e136c41f7b02c6f21b47299438600a92d84b0eb8a77a620e9f259d44c1f92dd862f81a01ec41bffc450374e822892ccff83eaecfb1990e83f4de2145fca5ec8296ab9fc1b8a0439ba319e8c30840792584a9a4b872b018c5a240409f573bfccb0aca548fc096b5b61230ec4dfec57b37646ab4"}, 0xe1, 0x1) chdir(&(0x7f0000000100)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) [ 180.370832][ T26] audit: type=1400 audit(1566702624.156:50): avc: denied { map } for pid=10751 comm="syz-executor.3" path=2F6D656D66643A0B656D31C1F8A68D4EC0A35CE2CBA2BAE5F497AC232AFF202864656C6574656429 dev="tmpfs" ino=32170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 03:10:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x28c) unshare(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') splice(r0, 0x0, r2, 0x0, 0x8120000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) [ 180.800853][ T26] audit: type=1804 audit(1566702624.596:51): pid=10735 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir567686820/syzkaller.PkCgWx/11/file0" dev="sda1" ino=16602 res=1 03:10:24 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:24 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffffffffffff3511, 0x103000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0xb6, @dev={0xfe, 0x80, [], 0x27}}, {0xa, 0x4e22, 0x8, @remote, 0x1000}, 0x4f, [0x5, 0xa11, 0xfffffffffffffffd, 0x0, 0x401, 0x1, 0x40, 0x632]}, 0x5c) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f00000002c0)=@v2={0x0, 0x0, 0x5, 0x2, 0xd7, "dad7ad5608b3ea99e3e3f1256e7bd49aa5272565c24dd70fc5592ffe3ad70083ca8b052482266b8a4098333286fa2157f645e9630b58938e07d50f3a4d7fd78da00cb97fc522f0a649571e40af3ca75c95a00fab3d5d0d11a12b97a0505343c346882716e136c41f7b02c6f21b47299438600a92d84b0eb8a77a620e9f259d44c1f92dd862f81a01ec41bffc450374e822892ccff83eaecfb1990e83f4de2145fca5ec8296ab9fc1b8a0439ba319e8c30840792584a9a4b872b018c5a240409f573bfccb0aca548fc096b5b61230ec4dfec57b37646ab4"}, 0xe1, 0x1) chdir(&(0x7f0000000100)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) 03:10:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x28c) unshare(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') splice(r0, 0x0, r2, 0x0, 0x8120000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 03:10:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x28c) unshare(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') splice(r0, 0x0, r2, 0x0, 0x8120000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 03:10:24 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200, 0x0) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000006e719ad4755277df00001e0000000000000000a26d9c00000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 03:10:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000003080)="11dca50d5e95cfe47bf070") sendmmsg$sock(r0, &(0x7f0000002f80)=[{{&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x2, 0x3, 0x0, {0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x700000000000000}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)=[@mark={{0x14, 0x1, 0x24, 0x400}}, @timestamping={{0x14, 0x1, 0x25, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0xacb9}}, @txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x81}}], 0x78}}, {{&(0x7f0000000300)=@caif=@dbg={0x25, 0x10001, 0x6}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000380)="7afc7a9cd8b24c3c7e78db35d2583d6c72586b3f1fa6b079dfe3b5c1aa007681ba41972dc417a2537c0da9fb63b28955", 0x30}, {&(0x7f00000003c0)="bfd6dec3918cef0f3f2ebd9666de2ef0c42bcc5a4908305880863811ca12bb299aaebd15711e8a634737af45b443efb09a4a295b82ec27ecd3d654f8fabd4e72f913f9acf99f6b3228a57c6f5a019cdcb65720501ab31371b4ef960f2dbbee8f4ecfda46b487afd96ccb0b00fe50b431d4b31e90435c9aacca2db286442303f45b5a91fce5d89af676339e1148e21548f66a731b62a2f47b3c89210a404edc15fd74e33791b1fe88dd7960aaea15c5c2eb3c98423f37164fc922c12da98be964ed92eff307462728f6", 0xc9}, {&(0x7f00000004c0)="a2a56a8a6dea8ee7fe48ab2584938b5c12d7a42af9bf697a82737e21cb390106f6f38741c9d953b8191039eebde57423ab8ba2a4623593a6d453331e8f198e9e7297cc89088c5d1df58fe79ab783ed9d31bcf1c8320db82e998b03108b69b41d390b9d7e7ba9bc6ee057ba00ee35719ce3f4", 0x72}, {&(0x7f0000000540)="8348c95433b088cdd7dffa11e76c0d4b64148e10e3849082dc71af9fa35fa7e709b4adcf8bdb99b04614ccfb6a33", 0x2e}, {&(0x7f0000000580)="d179b9e69fefec09ce99384ca6278c885b05c41fac206df2c49c8ce5244e57d2c6aebc21c04eb93c9fc1bea785be32ff08f8ec86d376dc4151a7dcf10acf2741216596092e2d8a1106658eb3e1f8d86e5f1e488b4e85f146a5a5245f72c165dc28f4f20af5f7027f2d892d4f18e3095ffa93d4cac16c3a0e871408e1870daa458776241a22b7e4c90bbd8b45c490e65367f1d5600683216bdbdeda08c777821f858c2c828c66cb4578ede0a2d6fc74b5df3a91ffbf169cc4bd1e182d378da0e55af4ad12", 0xc4}, {&(0x7f0000000680)="e3a6208f9276dd9e2159354dc30c7cabefabf256248c4e5d46259b4562dcabec806134cdecb02be42a28a51a00f2c3bf4073d78ecd9424d2b364fdb600e35c20e958dfdeb794cd203cda4297434ae6279c4f83dc27fd4071b6e3def1eb0c80f6c2ebbe59db581e61517ec04d2854e8f336abf9c35a833c15524f22ac00f8886672507e63cb81599e0288d5ed45e39bf9951204b543e4b5abf6fea37be33818b2a4cceac82854ce1cf6d90ecd8d006b2aa090766c43980e4e7c7a5d35c946fdf55b18c863e5f784828e7d192822a2ff304573f6d25108afcd7e96a629ebb0d0a5e29984", 0xe3}, {&(0x7f0000000780)="b50a71128cd253ab82f844b81a934b2c44e6039cdd833c2544aa2721cff6bc57304c0a5fdc672b333272e5ea9c1417d440b7f2d9724687b2ca611f13567ef9c8ef83f1edfaee78806cc57b1ed3cc9a75b9b841471d34029ba946addda4937f95c7328ae2fd89b9116fc5d40692", 0x6d}, {&(0x7f0000000800)="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", 0x1000}], 0x8}}, {{&(0x7f0000001880)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x0, 0x3, "39c212857af054e0689da4e6f611eaaf35c7111b9403e1c673151662c1fa05adfb918290420e5bd84f3fd3fbb080f92b279a4409b6ae8086f5195e8e34fc57", 0x22}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001900)="ffa89c94639c5eced50cff68787ac893a1a1bd2cf788e85fa068e609e9869d7930da39dfa6f00f623430a6a0ba076b3112e162910b5f57c3", 0x38}, {&(0x7f0000001940)="3a0d48119d2b3d475016228ffcef5f907e7bdd9cd1c7c61a54f5ad6a2b5baf7837b3fdd5ab026581df60fc07a86f8ec05fcd3d17eaa420c406f06aa45d786a98adb386f26054ed4ff4b108b7aee2fce3fb777cf09f3a642f322caf3411293803ce308e70afcebe431911b24adc82d0b21bacbcb4f987ed0c26651f5b29891bc9aa29d1e3cc99", 0x86}, {&(0x7f0000001a00)="a600108287", 0x5}, {&(0x7f0000001a40)="f7c71fbfcfbf639b15a678dbb2221164dd600e0ab62293c9b2818a0a66248e55f043bba0dfeb45cfbe0106365e210148d949f094eb52728c68747ac327435f964ec4cb5dca3c6504d0f1f86662ee047455efe2ff66ee329123406dcb1261286957698b8d8a114c1c87a4250f0959a528522d1422e622781dc2140f0bb2b03db89edd34157408e23b2d8dafa176d0317d9df620ac58cd1d3c4c534b99f67f6f82a1e55f0c36d412f7c3d85f8e4223328ba8ad3f7b44eb3fc66c8324ae78dc727e0f6504e4d06f06673ee832a7b91e0ed8589aca748f3b0df8fb99fafb9b418a3c58a92b252cb8029b1ce5fa471ed2c7d7ecd0af293df44541af7dda9a721ea190effd0359e56cd0931104675e3a06b8f6792def98bb54b549e9e797f763b4e9014e2df064b5c4924c6a3ea9d82535b2f2e5eb7436e5c7f9abf35bf3f9746b22d2a0f6f0d70cbdfc4269a2368c48a233b376b7627044c04e50b405b90981f7f2e63ac805f86227e8383e1fd2ef5c55708442a7a95f883a914648af3e6a18bf0726ae474672b01b1ed03c9eb989eb2d56adf6ed1534bd119c45d88b5c85ad7538a9f76689c24e15fa15c534b2eb01dd8859083e5e90e670b4b9e7d33a93bfe8c4ed9313de515da67d4a26c34640b3ff167fc62002302217c01d89cee421074a9c8ab6f56c923aa98f03a666c556ab13793d3a2d542d8aae976397238e69d5df31951503ba534902fb35ac54db52040acb5517e15d57463560819cc9b24a5b1d022f7369cd29fdea87e1f81ef8c03066821990bedcbe23f9dda4feb41b2ba8d7515eae9ae4fc24f2ee5fca4f847c153e164ba484c2891069c2a3437a25beefcc2c2b7a95763130a85c63f62ce16b2c935bcf4748d2bb1bf5f19bb9c8293814eaaa61c7fd47894bcd0a50474ee69d8b1908e06f9edc31c523a88744b661e1cc4ac3a572c14bdf7123166c37d1f2bf74b2ea8e99da65efb181a71d5532ffc54c2a46dfc294cce8a1338c3b5d0de244ed6510161aa736c574d5c43f5f35cff8f0f1b7b55dfb3677380453edaa396f5af238c83981d7a2c46058e6dc57f1ffbbd51a961a2299398b029da55b3cf6b2d08d086ada42547efe3f88c967b9d002532e7789daba1cc52dc64d9d9f6ace716c686af65aca3ddd5c640be3827bf3199302baa2dac3bbe409772594f989f8fb39fd6faf3d2f5ec322f06a339edca4e9f79ab7cf0549a7dda8f6e0fcd4a7aad85fc4a8c2a659692d3185e5f1454a8e2444201695a9fc37ad887fad425bd962a14f6dc6dd8f4d3c342d504478feab3a485b08adeba8d66076e9efc265122a7b43aa8300fe395cd4318fa0bf74ca72f0db73b6669925569ed3c71799b9e53c27225c1abcae88866cf455233379d5ea9c77fb04f48bbf5e611ae6e093a600de19bebb26469fada37230f489d5492c7806bf1dd02be2c0a00a99f1da5a6dab1009dc00985d739f59802920fbb6568d2e778a71b951f5feee20a6dba5bdd3ef2bff10b65245f750fbbd4ce745866a266d4ef078b605f4ad5036d01805f40e89e8404ac4a77bf7dc0817e96fb70e892c1d1862d1182f05c541e9b10c25eca0dff2b8f6ee02650ce6e6a6fe24de5662999d5af5337cc6d8350f26932a1c0cc7ea64434f54aba2302568d9f6d0815d524110f58e4927bf258c2a3238581f3fa4434e30b75e991ef9902c99ea8752b165a88c4f393377b02b78cfd2056138fc236bf7545c07061236e06e295aeebd083573ae66603646c51e7686cef53f232e83c124d13902150cd5fb5e3a93df0a891aeab740fb8b05eaec116fee52a2189f4280fd6ac633d0bbb97c9a05f94a728278c2dd10cf292bdf3d36332669cb5388f1b49a11bb77d7c96810a524e61ab16afc3225fbf800a70afb544b323485ec98731560dda9e3b17e3f7584f2fb3170ecd0657be8fc20df3d961a7641a2eb0c5d69c522d0e8f0d98309471ac0e8f194ee5459b0f40b25658b40c603acd4c4717bf6cc670ec65e9d7221a273ed82f835ff8f42de7dd7520f4e7df3e14ce26df51657dc390b2e8cb9d6fd54eaed5429c252dd81e837275115682342370942e0674f850d5365aefedb3a5684e2fc038b4729426dfa1c987c1e9bbc33181bb1da9cff630ed650b5cefc24546bb2bafb46849c2c2ffc6d2c42b001b4ac5cd42382a16f9b4466faeb7e8b032448e6a17df2618c6ab470d8de7c9a69e00f1a6dcc11e42c67b5eaff6ce9e6d968c4a2287b8cfecd5ddc50110cbf6c6389c671bf0bc6ad576adb4ce3b61e4747b89ec67c26bd5b35c5ec1c20fa790e933fdf801ee3d68bde98e16f58e8947d53dcf09a9f619ea163ea973cad41a142cf81f868c09c8eae67de7f58c0aa5e6b5cdc3c844f931a4bdca2631b58877d63922072d9440588ec4489778328427ece072b850bcabb9a7c7f4274f49cdd47bbbe9c3e3e9cf979156332cf39df2629b7224f0ae9352e2037cae8236748982bc5b47066aa762720980f14a6b14971441e4ec1240c0feb3337ee4073046499dd8d21b07f9deb131b8528df7a5fb3cbc561a991e146465b7634071827949f2d622fb77cf31aec03b5ef85f86208cce0e58ed04a4e39755c891919a0161b4a36b3ae0450ee9398679eba818e82ad8a1421cb415ee700049e154fc842221b476fbb093358278c191e3e5d9db6c256e254ca35c70fd9e57a69565804a175f13e811474bb891017036ab526931885a8f825196baadf271c4edb4df8ab9a037a50c1526866b0286eb8d580b2bef10340c43b38fca308a464d5757675bca9045f7f4822bc6521a1c7aeb5c7f7e6446444dc8cb6cac505b6ff278d8e6869bce2c345048bb5f7e952b6befa9f9c2d9750322ea7369ee657e3532d6e5d1f2751f324889c81929c42a270ef7ce1498eca7a7f32f153b48a769a6cf214d66d62a9c7b28604e12e85ecc8eb8827c3c5ba146b8c429e099c863c5ff01e784adf31f3f27ea148fe814a036369eb4ff8897d287666d11832d7037002a88fdeec3be7b18aefd9cdc42280eebbbc24874085eb0da81c07c6fbbf2d7c3fc90a0c80cbc751269b355eee3415d72a47b18b4e82c0b98b755e2768eddc7f2c389290698384706896b5b7917cf47050e6271489a56386e7e7306f0999200477a4947630b578aa0e233b3e4acc3b8389c348ac01550d9d185c4814c6759955bc41294c572be17e8112867ece854cbd6e779bb53bf646e914a36da36fe891346da24ad8457c3e91b2a8b9ab0bc9be58302859b65aa1a89fd41b67076a88bd214d6d2c89f9608b03be175c79ac1150c8b537666b2a39a031e3a6d9b0bc037d8fd6fe19a95e8eaddd7cb4256e63bd0cece7d5183e1059f4d7a43cf0e6674c426f1072551e86e6caf12ddb00aea55487820deebcaa63141a62103eba9f2e6eb4613402189abb479d13a1484969f5b23c20962bccc0fb05c42a5af37b1aedbf7f64109fa33ba46722d7d4d5ab11d66c3dcb13c4a0314beb12061df3abd683d3dbdc7155853d6452e785a22e56ec783df1489190c2d3d4cd6c3a01f077067311dc1568032c9e0505f6828f57dd5c8882fea96dc0acdf72ea43662779379fe9796473dabc52e9aee69149646564c00bd699b9a22677ca8b046d41d277e4f1a8aed263bd069ed02b174bacff546489c3cfaa5fe9fb23f480dfa5f0479ba31344721706c8dcc4f5d494f583f428ab6466b4ecd04595f9b8458c25fe10aa5b5c0c4a14f0401443755e38abe7fb2cd87178048ee5e0ffef366815b144715fcc536230cb22efff029218c5bee21497439bcdb35b7c4cbd29db60765c099fe4e652067cee9b11b5a317a02cf9b7a8fc3c7a9c38c3e2cefbef9cc52290993ea6eedee9d9dc4074a2a28c6c329c9df5f7c070f904c1969896dcc6c2505f90a2a9f551aca5b931119b9d439f9c1f93d6364f663a88e8065c1a8e7a21c6bf81f8ed7e464a65022ae2ff511562f65aacfddc31c91bdeeab55a02d1dc8f126d783194d46e592cda105e379ca88003ae7b650eb52ebde4315b2606b39f2538b4640948682bfe5d2567a012477a1f625d2603ce1972999030857d6392ffeb1a7d0a2662cb1b4df7e859728f6d3f34831dd8a7c9566626caa3451999ca9e1707d88003623442f93625dc520c88e896f418705bced97965b2f98059566b2dcbb8f6a188ed48ff9f4b42327b6666876a0e53d8bec552490f1268d67029f4b47194039df399e2a4c7dfa7d354231a76828f13bd743e549333705cea2f304c05a18794acdbb097efdead66f698b130980e606301d8eb13eb04e8c6505cdd5c984863c67a8651513c25baedf8a6005633e2439d9457a4ff55b2883015ef82319c0074fc78a0a9b3b59cf6bb5b0bdf40362e76980fa787814dab4b746ca1210b7176ec3eb06cdc14284099f99a5f53a4b8a51cbb44bbe7a5f0aefd0792284df1ba6563c984a03a6e03ebfe040b42d04d40e67c64e16f8b22d7f1e6b18b7fea59f943a2c5f04f8bbbfe15f92e604cb76af5b563b4d7d468ebf812a4950ed7760008c73ce4600bffe11eec7db9c15c1e4b3fc1c03cebc93452aeb38b1b88c7741eab14900c64821a225f932403a9eab49f52ed1c7cffcacc0a5ba856c487d24359828b34d3851d4192b7c4fe934be932c264ca6069a9441e4b65a23a2ab3b3c18c910e6a6a03e5be3e1967f384d80600f5fcc4421a6f77c3cbee75e89cbbf4969c1b5673dddb3a4583e82f8fc9a5b8910f9ecf9d12f2706019acb95d8d54f1e8a503868e063ab99cd92ef2657c86083e64aa0d957f14e7bb424fb128a056b4eecec57e659db4313a2def56b027e992796254b1c00fc761d10389e1d5b35e0d13addc5253f4957644f97c03ccf70fc21c92dafdf21e2afe04ba79e247555566ff56902e6ac8bd203c93ea55370c36211ff0206b2562e72e24717aaf1d033724ee1e36593ecb624e954fa0a69ce58e1735b4532f3268b32dd980482936691c42b552b65ac59d7f62fe0f0491ce3217935b2cf076a3a42f53f7bbf76abd7eeda2545f8d1dc101f2978c1deab0e56ca6191949f79f624328c838084e2cd0c9f501fab56691c8df0e08596792cd1cbcf0de0e0c1fab6a31511a8ed9b6598b79f8d50496b125644aeda20850f85a1f5425052281b463e98fdf26cc87de16b9b5d96464d7ad0ed310066638f768099e2147570b22b1091cf9f5583190df7887c6166cc31563c9ad39af7014869f809c31bf3e4e49dc53eb639b1cf891a5c778389830ce8d08c63ba28a06122dfa13dbe1b4a80bb8fcace9ae83a4c52d42e75cc9348312d9568334aa03229c275d78b3284508722f04b3be203bee716c408657276478712ef7f6f422b83fe9d796425897b5d3adab081a0e9d71e84ef721a826dd0a8d9464f42c5b03af2e3415a775237edb0bed93204e59adcb26ea3bd176cc6d331b38c45e87abc7c642eb979c722f79b4a9a04da2820ec8aadb12b40fe891a48f34379097537eef4e93ac459db4ecd7632a986961118f0e8e0cee6df33385d207e791b38f1ecdec759e64e6efd19b91bbda59619cef294287c932276c50a55915ddf3267824e7f8333bdc19bf6f412c7ea87c61e400dba0a9108ac140fd0ef023a7e451cf6a5a251d38f626840a43ff40d794789b9e465089454962df23b33296a277d137614a9de0bed1b584f20f465bade6678a1692fb0bd5252609332c123658b54e8258a8539780e7ed700d7d67ea810b4b2be9141f21bdfa62badd97adfeb42a3dd972e2cbbdae7b384c58b45dfe297eb4cf198f4332d4a0afc5c4785ba3ca", 0x1000}, {&(0x7f0000002a40)="5f1abcfb61768be16d5b5a8569cf8bf390ef5ff49fc334c1d3dc4cbc69fc57a767208e2aa9eb1646dd1ba938ea6028073bf7ae42464ea4af5b33da79b88a2687221381a61b2ad81ed89f2bec20318953f262f6b5aea6b312bf9b9093b68fbff364ce384be130c5f4890d963823e913d1e2553913c21592724be93a02833e2d87484bc942b160821c605233f6462898b4b9fa394beac0d43d3ec01d63a5ae42866eae4cb6c23db16b7d44fb89a1c428db535b3ff6114fb12d0bb926b21fc34a30384f426c1f5cc5a7a664ec5084a291a16dbc44708f128db4e9451697b80f1412678c9f2534eaf57596bf4b5509", 0xed}], 0x5}}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000002bc0)="82dcbe1fa922e9e01103d43704c39265cffbfe2879ecbd6315f92ed7ab7f55aa6dcdb7123995c0d3f697c682e8b3a89ede775976196a912069140571b504917679a00cbf6cbb2536cc4e5454633fa7dd775cf619d3d90ee6674caa75e0cfdea89056fb4fea46d34624e58f10ffb928", 0x6f}, {&(0x7f0000002c40)="432642384f3a34033142012d78135d9540ae852d9cca70b4816650d2a4ccc007b3475f224c649aec9f3f1657d9d5301f53b5a132591b88fab8b682a66fd7b0d0afa6d8d07c", 0x45}, {&(0x7f0000002cc0)="4a31b0b13615", 0x6}, {&(0x7f0000002d00)="0211d759d87cc83d4cc24c8e7bd22b0e216f3837ce2e80a84b0bd9f952f6e09cc3b597889334d571fbfc92d97c66b69697f8e886ed2c30aab258b715e56f96c91829c855eeccdaa38933600124413760b02fef7d96c6788eebcaffcf688bf50532558b231618647b877fff17d5925a3ec48fa07f42df42c3b09707d465994031370dc668464aa6ee775381c140f2b1ec6574cab94fb5811e6ee4a6717b7e2721ba922e7cd8108b390a8f", 0xaa}, {&(0x7f0000002dc0)="1f1c3869aa45cb3c15b0d81f005eaec7fcd50716028ff4b8368caa99628f5822fe74dc1ec92e66862a98bcbc5eff14ea1b64b70e7b3a9c04eec073c25298fd", 0x3f}, {&(0x7f0000002e00)="3d2c55cc1f794c114d", 0x9}, {&(0x7f0000002e40)="5c1d7e63e36f41696432867cf9af00e8fc1745addd340fa7107dc2909a1fa2fb5f5090659e590aa93aba0d5c08f196d51babb379fcfc15e98dcebccd8a2bf535dec43d3bf3d558164c2b9c6eb71961a56ed8232102475c2451f7b3f4b5f7e473571373f3656c6955a19d5a11a9c73b0c6ceec4519dab9641dc", 0x79}], 0x7, &(0x7f0000002f40)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x30}}], 0x4, 0x4000000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xe9fa035f0fb6f795, 0x0) getpeername$netrom(r1, &(0x7f0000000080)={{}, [@null, @bcast, @rose, @null, @null, @remote, @null]}, &(0x7f0000000180)=0x48) syz_emit_ethernet(0x300cce, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0700800007128100020086dd60b40900000800004f85c1289602024300800080000000ffffe0000002ff0200000000000000000000000000013a0090780007040070b680fa0000000000000000000000000000ffffffffffff0000000000000000001fffffac14ffbb"], 0x0) [ 181.039041][ T26] audit: type=1400 audit(1566702624.836:52): avc: denied { prog_load } for pid=10778 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:10:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysfs$1(0x1, &(0x7f0000000180)='mqueue\x00') r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$alg(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x4000004) 03:10:24 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x40000) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000100)={0x0, 0x0, 0x2080}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x112, 0x6, 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) 03:10:24 executing program 3: syz_genetlink_get_family_id$ipvs(0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x40) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x2594, 0x0, 0xfffffffffffffff8) writev(0xffffffffffffffff, 0x0, 0x61eed941f11371b6) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x8804) add_key(0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x11, 0xffffff84, 0x0, 0x0, 0x0, 0x2, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x10}, @dev}}}}}}, 0x0) add_key$keyring(0x0, &(0x7f0000000640)={'syz', 0x1}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000680)='ceph\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 03:10:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x50, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x200000, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000200)=""/229, &(0x7f0000000340)=0xe5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 03:10:25 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000080)) 03:10:25 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffffffffffff3511, 0x103000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0xb6, @dev={0xfe, 0x80, [], 0x27}}, {0xa, 0x4e22, 0x8, @remote, 0x1000}, 0x4f, [0x5, 0xa11, 0xfffffffffffffffd, 0x0, 0x401, 0x1, 0x40, 0x632]}, 0x5c) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f00000002c0)=@v2={0x0, 0x0, 0x5, 0x2, 0xd7, "dad7ad5608b3ea99e3e3f1256e7bd49aa5272565c24dd70fc5592ffe3ad70083ca8b052482266b8a4098333286fa2157f645e9630b58938e07d50f3a4d7fd78da00cb97fc522f0a649571e40af3ca75c95a00fab3d5d0d11a12b97a0505343c346882716e136c41f7b02c6f21b47299438600a92d84b0eb8a77a620e9f259d44c1f92dd862f81a01ec41bffc450374e822892ccff83eaecfb1990e83f4de2145fca5ec8296ab9fc1b8a0439ba319e8c30840792584a9a4b872b018c5a240409f573bfccb0aca548fc096b5b61230ec4dfec57b37646ab4"}, 0xe1, 0x1) chdir(&(0x7f0000000100)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) 03:10:25 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x653, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000180)=0xffffffffffffff54) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f00000004c0)="1c0000001a009b8a14e5f46b000000ff00"/28, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="fd78f6aa090076ea"], 0x12) recvmmsg(r1, &(0x7f00000025c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/37, 0x25}, {&(0x7f0000000200)=""/219, 0xdb}, {&(0x7f0000000300)=""/241, 0xf1}, {&(0x7f0000000400)=""/67, 0x43}, {&(0x7f0000000500)=""/172, 0xac}, {&(0x7f0000000480)=""/21, 0x15}], 0x6, &(0x7f0000000640)=""/138, 0x8a}, 0x1}, {{&(0x7f0000000700)=@hci, 0x80, &(0x7f0000001b00)=[{&(0x7f0000000780)=""/97, 0x61}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/13, 0xd}, {&(0x7f0000002700)=""/28, 0x1c}, {&(0x7f0000001880)=""/27, 0x1b}, {&(0x7f00000018c0)=""/133, 0x85}, {&(0x7f0000001980)=""/154, 0x9a}, {&(0x7f0000001a40)=""/149, 0x95}], 0x8, &(0x7f0000001b80)=""/153, 0x99}, 0x35}, {{&(0x7f0000001c40)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001cc0)=""/28, 0x1c}, {&(0x7f0000001d00)=""/19, 0x13}, {&(0x7f0000001d40)=""/16, 0x10}, {&(0x7f0000001d80)=""/94, 0x5e}], 0x4, &(0x7f0000001e40)=""/247, 0xf7}, 0x3f}, {{&(0x7f0000001f40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000002300)=[{&(0x7f0000001fc0)=""/65, 0x41}, {&(0x7f0000002040)=""/189, 0xbd}, {&(0x7f0000002100)=""/58, 0x3a}, {&(0x7f0000002140)=""/14, 0xe}, {&(0x7f0000002180)=""/108, 0x6c}, {&(0x7f0000002200)=""/201, 0xc9}], 0x6}, 0x8000}, {{&(0x7f0000002380)=@sco, 0x80, &(0x7f0000002580)=[{&(0x7f0000002400)=""/163, 0xa3}, {&(0x7f00000024c0)=""/94, 0x5e}, {&(0x7f0000002540)=""/29, 0x1d}], 0x3}, 0x6}], 0x5, 0x2, &(0x7f0000003100)={0x0, 0x1c9c380}) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000100)={'team_slave_0\x00', {0x2, 0x4e23, @multicast1}}) 03:10:25 executing program 3: syz_genetlink_get_family_id$ipvs(0x0) socket(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x40) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x2594, 0x0, 0xfffffffffffffff8) writev(0xffffffffffffffff, 0x0, 0x61eed941f11371b6) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, 0x0, 0x8804) add_key(0x0, &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x11, 0xffffff84, 0x0, 0x0, 0x0, 0x2, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x10}, @dev}}}}}}, 0x0) add_key$keyring(0x0, &(0x7f0000000640)={'syz', 0x1}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000680)='ceph\x00', &(0x7f00000006c0)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 03:10:25 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000080)) 03:10:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000500)) signalfd4(r3, &(0x7f0000000080), 0x8, 0x702d21e24dab0791) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:25 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000080)) [ 181.786814][T10809] syz-executor.1 (10809) used greatest stack depth: 23576 bytes left 03:10:25 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e23, 0x2, 'sed\x00', 0x29, 0x1, 0x48}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x10000, 0x80000000, 0x5, 0x6}}, 0x44) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 03:10:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x50, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x200000, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000200)=""/229, &(0x7f0000000340)=0xe5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) [ 181.840669][ T26] audit: type=1400 audit(1566702625.636:53): avc: denied { prog_run } for pid=10836 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 181.948244][T10853] IPVS: set_ctl: invalid protocol: 92 172.20.20.11:20003 03:10:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000500)) signalfd4(r3, &(0x7f0000000080), 0x8, 0x702d21e24dab0791) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") epoll_create(0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100000000, 0x0, 0x0, 0x1, 0x7, 0x2}, &(0x7f0000000240)=0x20) r2 = socket(0x2, 0x3, 0x67) futimesat(r1, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{0x0, 0x7530}}) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e0000000400000010030000280200000000000000000000f0000000000000002003000020030000200300002003000020030000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000ac1e00010000000000000000626f6e645f736c6176655f300000000073797a5f74756e000000000000000000000000000000000000000000000000000000b4f908b3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800f8000000000000000000000000000000000000000000000000006000434c55535445524950000000000000000000000000000000000000000000000000000180c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1e0001e0000001000000000000000073797a5f74756e000000000000000000697036746e6c30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800c000000000000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280000000000000000000000000000180000000000000000000000000000000000feffffff00000000"], 0x370) sendto$unix(r2, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) 03:10:25 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000080)) [ 182.053216][T10853] IPVS: set_ctl: invalid protocol: 92 172.20.20.11:20003 03:10:25 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e23, 0x2, 'sed\x00', 0x29, 0x1, 0x48}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x10000, 0x80000000, 0x5, 0x6}}, 0x44) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') [ 182.192810][T10871] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! [ 182.205520][T10873] IPVS: set_ctl: invalid protocol: 92 172.20.20.11:20003 03:10:26 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee67, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x50, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x200000, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000200)=""/229, &(0x7f0000000340)=0xe5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 03:10:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x2, 0x4000000005, 0x2, 0xffffffffffffffff, 0x7fff}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', &(0x7f0000000180)}, 0x20) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f0000000200)=0x4) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000100)=0x3) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000140)='\x00', &(0x7f0000000240)='./file0\x00', r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000200), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000500), &(0x7f0000000140)}, 0x20) 03:10:26 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 03:10:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000500)) signalfd4(r3, &(0x7f0000000080), 0x8, 0x702d21e24dab0791) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:26 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e23, 0x2, 'sed\x00', 0x29, 0x1, 0x48}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x10000, 0x80000000, 0x5, 0x6}}, 0x44) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') [ 182.509401][T10885] IPVS: set_ctl: invalid protocol: 92 172.20.20.11:20003 03:10:26 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e23, 0x2, 'sed\x00', 0x29, 0x1, 0x48}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x10000, 0x80000000, 0x5, 0x6}}, 0x44) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 03:10:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000500)) signalfd4(r3, &(0x7f0000000080), 0x8, 0x702d21e24dab0791) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:26 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x7) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sysfs$1(0x1, &(0x7f0000000000)='security@eth0\x00') sendmmsg(r0, &(0x7f0000000440), 0x400000000000419, 0x0) [ 182.633503][T10896] IPVS: set_ctl: invalid protocol: 92 172.20.20.11:20003 03:10:26 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x5c, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e23, 0x2, 'sed\x00', 0x29, 0x1, 0x48}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x10000, 0x80000000, 0x5, 0x6}}, 0x44) 03:10:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000500)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) [ 182.794642][T10908] IPVS: set_ctl: invalid protocol: 92 172.20.20.11:20003 03:10:26 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:26 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040), 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 03:10:27 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") shutdown(r0, 0x0) r2 = gettid() socket$inet_udplite(0x2, 0x2, 0x88) ptrace$getregset(0x4204, r2, 0x203, &(0x7f0000000140)={&(0x7f0000000040)=""/206, 0xce}) 03:10:27 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000500)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000500)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000280)={0x30, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x10b, 0x9, 0x0, 0x31a, 0xa6, 0xfffffffffffffffa, 0x2a, 0x81}, "df6f13a075f6ad0f13aa5d3fde0f183cd38199098b0218a99a50d2e4f5078280f656886b69f2847d322cfc048631aedbbf5ff8782a57cd6ad22b0408ba2e2c3ae9fca93a6698057f1f1469b968e095bd4c738c82b709ba33ad8f0447477cd511230615330f06b7"}, 0x87) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xebeec160ea844277}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xa8, r3, 0x24, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3bfc}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x428}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffff01}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40000}, 0x20004001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f0000000200)={0xfffffffffffffff8, 0xffff, 0x4, 0xd10, 0x1}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) pipe2(0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x10540, 0x0) write$eventfd(r4, &(0x7f0000000240)=0x8, 0x8) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x404200, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r5, 0xc0105303, &(0x7f0000000180)={0x2, 0x6}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_MSR_INDEX_LIST(r6, 0xc004ae02, &(0x7f0000000380)=ANY=[@ANYBLOB="0500000000000000000000000000346b86ce3742218c0000000000008c9e3b5ca0d300000000"]) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x5, 0x0, 0x0, 0x0, 0x0, 0x81, 0xffffffffffff5d80}, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000001480)=0x28, 0x4) 03:10:27 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) 03:10:27 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000500)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) 03:10:27 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 03:10:27 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 03:10:27 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2(&(0x7f0000000040), 0x800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:27 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 03:10:28 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:28 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:28 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 03:10:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:28 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 03:10:28 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:28 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:28 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:28 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:28 executing program 2: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:28 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x41, 0x208000) 03:10:28 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:29 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 03:10:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:29 executing program 2: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:29 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:29 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9491}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x99}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x40000) 03:10:29 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:29 executing program 2: r0 = socket$inet(0x2b, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:29 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 03:10:29 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:29 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:29 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:29 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:29 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:29 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:29 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:29 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:30 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:30 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:30 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:30 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:30 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:30 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:30 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:30 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:30 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:30 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:30 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:30 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:30 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:30 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:31 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:31 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:31 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:31 executing program 3: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:31 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:31 executing program 3: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:31 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 03:10:31 executing program 3: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:31 executing program 4: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:32 executing program 3: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 03:10:32 executing program 4: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 03:10:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 4: connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 3: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 4: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 3: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 4: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:32 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:32 executing program 4: r0 = socket(0x0, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 3: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 4: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:33 executing program 3: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:33 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty}, {}, {}, 0x0, 0x6e6bb8}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:33 executing program 3: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 4: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:33 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3"}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:33 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, 0x0, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:33 executing program 4: r0 = socket(0x2000000000000021, 0x0, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:33 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3"}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:33 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3"}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:33 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x1f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:34 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:34 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x1f, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bc"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x1f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:34 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:34 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:34 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) [ 190.882987][T11479] FAULT_INJECTION: forcing a failure. [ 190.882987][T11479] name failslab, interval 1, probability 0, space 0, times 1 [ 191.004121][T11479] CPU: 0 PID: 11479 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #118 [ 191.012235][T11479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.022296][T11479] Call Trace: [ 191.025607][T11479] dump_stack+0x172/0x1f0 [ 191.029952][T11479] should_fail.cold+0xa/0x15 [ 191.034548][T11479] ? up_write+0x9d/0x280 [ 191.038891][T11479] ? fault_create_debugfs_attr+0x180/0x180 [ 191.044702][T11479] ? page_to_nid.part.0+0x20/0x20 [ 191.049731][T11479] ? ___might_sleep+0x163/0x280 [ 191.054586][T11479] __should_failslab+0x121/0x190 [ 191.059521][T11479] should_failslab+0x9/0x14 [ 191.064025][T11479] __kmalloc_track_caller+0x2dc/0x760 [ 191.069403][T11479] ? mark_held_locks+0xf0/0xf0 [ 191.074160][T11479] ? xfrm_user_policy+0x177/0x810 [ 191.079171][T11479] memdup_user+0x26/0xb0 [ 191.079186][T11479] xfrm_user_policy+0x177/0x810 [ 191.079201][T11479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.079218][T11479] ? xfrm_state_update+0xd70/0xd70 [ 191.099616][T11479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.105866][T11479] ? ns_capable_common+0x93/0x100 [ 191.110898][T11479] do_ip_setsockopt.isra.0+0x30b7/0x3dd0 [ 191.116972][T11479] ? is_bpf_text_address+0xd3/0x170 [ 191.122180][T11479] ? ip_ra_control+0x4e0/0x4e0 [ 191.126947][T11479] ? avc_has_perm+0x376/0x600 [ 191.131632][T11479] ? __kasan_check_read+0x11/0x20 [ 191.136664][T11479] ? lock_downgrade+0x920/0x920 [ 191.141522][T11479] ? avc_has_perm+0xcc/0x600 [ 191.146122][T11479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.152371][T11479] ? avc_has_perm+0x401/0x600 [ 191.157051][T11479] ? avc_has_perm_noaudit+0x560/0x560 [ 191.162425][T11479] ? __cgroup_bpf_prog_array_is_empty+0x10d/0x220 [ 191.168847][T11479] ? __kasan_check_read+0x11/0x20 [ 191.173890][T11479] ? lock_downgrade+0x920/0x920 [ 191.178742][T11479] ? cgroup_bpf_release+0x700/0x700 [ 191.183962][T11479] ? __cgroup_bpf_prog_array_is_empty+0x134/0x220 [ 191.190380][T11479] ip_setsockopt+0x49/0x100 [ 191.194877][T11479] tcp_setsockopt+0x8f/0xe0 [ 191.199368][T11479] sock_common_setsockopt+0x94/0xd0 [ 191.199385][T11479] smc_setsockopt+0xcb/0x960 [ 191.199397][T11479] ? security_socket_setsockopt+0x8d/0xc0 [ 191.199415][T11479] __sys_setsockopt+0x261/0x4c0 [ 191.219711][T11479] ? sock_create_kern+0x50/0x50 [ 191.224559][T11479] ? fput+0x1b/0x20 [ 191.228386][T11479] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 191.234460][T11479] __x64_sys_setsockopt+0xbe/0x150 [ 191.239577][T11479] do_syscall_64+0xfd/0x6a0 [ 191.244179][T11479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.250062][T11479] RIP: 0033:0x459879 03:10:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:34 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) [ 191.250075][T11479] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.250082][T11479] RSP: 002b:00007fcecb23dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 191.273560][T11479] RAX: ffffffffffffffda RBX: 00007fcecb23dc90 RCX: 0000000000459879 [ 191.273569][T11479] RDX: 0000000000000011 RSI: 0000000000000000 RDI: 0000000000000003 [ 191.273575][T11479] RBP: 000000000075bf20 R08: 00000000000000e8 R09: 0000000000000000 [ 191.273581][T11479] R10: 00000000200018c0 R11: 0000000000000246 R12: 00007fcecb23e6d4 [ 191.273589][T11479] R13: 00000000004cf280 R14: 00000000004dde58 R15: 0000000000000004 03:10:35 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x1f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:35 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x37, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:35 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:35 executing program 2 (fault-call:2 fault-nth:1): r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) [ 191.554315][T11513] FAULT_INJECTION: forcing a failure. [ 191.554315][T11513] name failslab, interval 1, probability 0, space 0, times 0 [ 191.579731][T11513] CPU: 0 PID: 11513 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #118 [ 191.587928][T11513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.597984][T11513] Call Trace: [ 191.601299][T11513] dump_stack+0x172/0x1f0 [ 191.605632][T11513] should_fail.cold+0xa/0x15 [ 191.610236][T11513] ? fault_create_debugfs_attr+0x180/0x180 [ 191.616050][T11513] ? __might_fault+0x12b/0x1e0 [ 191.620832][T11513] ? __kasan_check_read+0x11/0x20 [ 191.625860][T11513] __should_failslab+0x121/0x190 [ 191.630803][T11513] should_failslab+0x9/0x14 [ 191.635310][T11513] kmem_cache_alloc_trace+0x4b/0x790 [ 191.640601][T11513] xfrm_policy_alloc+0x88/0x420 [ 191.645448][T11513] xfrm_compile_policy+0x254/0x430 [ 191.650562][T11513] xfrm_user_policy+0x288/0x810 [ 191.655422][T11513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.661664][T11513] ? xfrm_state_update+0xd70/0xd70 [ 191.666782][T11513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.673024][T11513] ? ns_capable_common+0x93/0x100 [ 191.678051][T11513] do_ip_setsockopt.isra.0+0x30b7/0x3dd0 [ 191.683684][T11513] ? is_bpf_text_address+0xd3/0x170 [ 191.688888][T11513] ? ip_ra_control+0x4e0/0x4e0 [ 191.693655][T11513] ? avc_has_perm+0x376/0x600 [ 191.698335][T11513] ? __kasan_check_read+0x11/0x20 [ 191.703370][T11513] ? lock_downgrade+0x920/0x920 [ 191.708219][T11513] ? avc_has_perm+0xcc/0x600 [ 191.712817][T11513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.719061][T11513] ? avc_has_perm+0x401/0x600 [ 191.723742][T11513] ? avc_has_perm_noaudit+0x560/0x560 [ 191.729161][T11513] ? __cgroup_bpf_prog_array_is_empty+0x10d/0x220 [ 191.735574][T11513] ? __kasan_check_read+0x11/0x20 [ 191.740619][T11513] ? lock_downgrade+0x920/0x920 [ 191.745474][T11513] ? cgroup_bpf_release+0x700/0x700 [ 191.750687][T11513] ? __cgroup_bpf_prog_array_is_empty+0x134/0x220 [ 191.757106][T11513] ip_setsockopt+0x49/0x100 [ 191.761609][T11513] tcp_setsockopt+0x8f/0xe0 [ 191.766114][T11513] sock_common_setsockopt+0x94/0xd0 [ 191.771318][T11513] smc_setsockopt+0xcb/0x960 [ 191.775918][T11513] ? security_socket_setsockopt+0x8d/0xc0 [ 191.781650][T11513] __sys_setsockopt+0x261/0x4c0 [ 191.786514][T11513] ? sock_create_kern+0x50/0x50 [ 191.791715][T11513] ? fput+0x1b/0x20 [ 191.795530][T11513] ? switch_fpu_return+0x1fa/0x4f0 [ 191.800640][T11513] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 191.806712][T11513] __x64_sys_setsockopt+0xbe/0x150 [ 191.811828][T11513] do_syscall_64+0xfd/0x6a0 [ 191.816336][T11513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.822221][T11513] RIP: 0033:0x459879 [ 191.826114][T11513] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.845715][T11513] RSP: 002b:00007fcecb23dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 03:10:35 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x1f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x37, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x37, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b05"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3b, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2b"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) [ 191.854135][T11513] RAX: ffffffffffffffda RBX: 00007fcecb23dc90 RCX: 0000000000459879 [ 191.862109][T11513] RDX: 0000000000000011 RSI: 0000000000000000 RDI: 0000000000000003 [ 191.870085][T11513] RBP: 000000000075bf20 R08: 00000000000000e8 R09: 0000000000000000 [ 191.878057][T11513] R10: 00000000200018c0 R11: 0000000000000246 R12: 00007fcecb23e6d4 [ 191.886026][T11513] R13: 00000000004cf280 R14: 00000000004dde58 R15: 0000000000000004 03:10:35 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:35 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x1f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:35 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:35 executing program 2 (fault-call:2 fault-nth:2): r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3d, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a063"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:36 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3d, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x2, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x2f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x37, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b05"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x3, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3d, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x37, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b05"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:36 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x4, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:36 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:36 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:37 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x6, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x37, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:37 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x1a0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3b, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2b"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:37 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x300, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:37 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:37 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:37 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:37 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x600, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3d, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x3f00, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3d, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:38 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x4000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3d, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:38 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d5"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:38 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x8000a0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:38 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:38 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x1000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:39 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:39 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:39 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x2000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:39 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:39 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:39 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x3000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:39 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:39 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, 0x0, 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x4000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:39 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00), 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x6000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:39 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00), 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00), 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00), 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:40 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00), 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x3f000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c55"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00), 0x0, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x40000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:40 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3e, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x80ffffff, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:40 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xa0008000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:40 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:40 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xa0010000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:40 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:40 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:41 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xa4ffffff, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:41 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xffffff80, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:41 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xffffffa4, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x0, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:41 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:41 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x1a0ffffffff, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:41 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e"], 0x7b}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e"], 0x7b}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:42 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e"], 0x7b}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x8000a0ffffffff, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e"], 0x7b}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e"], 0x7b}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x100000000000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e"], 0x7b}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d"], 0xb9}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x200000000000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d"], 0xb9}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d"], 0xb9}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(0x0, &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:42 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x300000000000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:42 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d"], 0xb9}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d"], 0xb9}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x400000000000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:43 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d"], 0xb9}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(0x0, &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90"], 0xd8}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90"], 0xd8}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x600000000000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:43 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(0x0, &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90"], 0xd8}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90"], 0xd8}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x3f00000000000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:43 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90"], 0xd8}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90"], 0xd8}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x4000000000000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:43 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f"], 0xe7}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f"], 0xe7}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f"], 0xe7}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:43 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:43 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x80ffffff00000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:43 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f"], 0xe7}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f"], 0xe7}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xa4ffffff00000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:44 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f"], 0xe7}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:10:44 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596"], 0xef}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3f, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xffffffff00000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:44 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596"], 0xef}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:10:44 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596"], 0xef}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xffffffffa0008000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:44 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596"], 0xef}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596"], 0xef}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:10:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596"], 0xef}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xffffffffa0010000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:44 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0xffffffff00000000, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d3691"], 0xf3}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d3691"], 0xf3}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:44 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x2, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:44 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d3691"], 0xf3}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:45 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d3691"], 0xf3}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d3691"], 0xf3}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x3, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d3691"], 0xf3}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f4"], 0xf5}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x4, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:45 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f4"], 0xf5}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f4"], 0xf5}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x5, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:45 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f4"], 0xf5}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f4"], 0xf5}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x6, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:45 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0xf6}}], 0x1, 0x0) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:45 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f4"], 0xf5}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0xf6}}], 0x1, 0x0) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x7, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:46 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0xf6}}], 0x1, 0x0) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 03:10:46 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x8, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0xf6}}], 0x1, 0x0) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0xf6}}], 0x1, 0x0) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x7, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:46 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x9, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 03:10:46 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0xf6}}], 0x1, 0x0) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0xa, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:46 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 03:10:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 5 (fault-call:6 fault-nth:0): socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:46 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0xb, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:46 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x90) 03:10:46 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x90) 03:10:46 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:46 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0xc, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) [ 203.210436][T12484] FAULT_INJECTION: forcing a failure. [ 203.210436][T12484] name failslab, interval 1, probability 0, space 0, times 0 [ 203.249730][T12484] CPU: 1 PID: 12484 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 203.257843][T12484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.267899][T12484] Call Trace: [ 203.271204][T12484] dump_stack+0x172/0x1f0 [ 203.275549][T12484] should_fail.cold+0xa/0x15 [ 203.280152][T12484] ? fault_create_debugfs_attr+0x180/0x180 [ 203.285967][T12484] ? page_to_nid.part.0+0x20/0x20 [ 203.291002][T12484] ? ___might_sleep+0x163/0x280 [ 203.295862][T12484] __should_failslab+0x121/0x190 [ 203.300807][T12484] should_failslab+0x9/0x14 [ 203.305312][T12484] kmem_cache_alloc+0x2aa/0x710 [ 203.310167][T12484] ? __kasan_check_write+0x14/0x20 [ 203.315282][T12484] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 203.322352][T12484] getname_flags+0xd6/0x5b0 [ 203.326841][T12484] getname+0x1a/0x20 [ 203.330717][T12484] do_sys_open+0x2c9/0x5d0 [ 203.335113][T12484] ? filp_open+0x80/0x80 [ 203.339338][T12484] ? __ia32_sys_read+0xb0/0xb0 [ 203.344095][T12484] ? switch_fpu_return+0x1fa/0x4f0 [ 203.349188][T12484] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 203.370014][T12484] __x64_sys_openat+0x9d/0x100 [ 203.375023][T12484] do_syscall_64+0xfd/0x6a0 [ 203.379511][T12484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.385380][T12484] RIP: 0033:0x459879 [ 203.389258][T12484] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.408836][T12484] RSP: 002b:00007f98593ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 03:10:47 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0xd, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) [ 203.417224][T12484] RAX: ffffffffffffffda RBX: 00007f98593ccc90 RCX: 0000000000459879 [ 203.425175][T12484] RDX: 0000000000000000 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 203.433129][T12484] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.441077][T12484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f98593cd6d4 [ 203.449027][T12484] R13: 00000000004c6135 R14: 00000000004daeb8 R15: 0000000000000006 03:10:47 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) 03:10:47 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x90) 03:10:47 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x90) 03:10:47 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0xf, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:47 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x10, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:47 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x90) 03:10:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 03:10:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:47 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x12, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:47 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x2, 0x0) 03:10:47 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 03:10:47 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:48 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:48 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x4, 0x0) 03:10:48 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x13, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 03:10:48 executing program 4 (fault-call:3 fault-nth:0): r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:48 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x90) 03:10:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0}, 0x10) 03:10:48 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x14, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:48 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x6, 0x0) 03:10:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) 03:10:48 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0xc, 0x0) 03:10:48 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x15, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0}, 0x10) 03:10:48 executing program 3 (fault-call:3 fault-nth:0): r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x1}, 0x10) [ 205.294633][T12572] FAULT_INJECTION: forcing a failure. [ 205.294633][T12572] name failslab, interval 1, probability 0, space 0, times 0 [ 205.307320][T12572] CPU: 1 PID: 12572 Comm: syz-executor.4 Not tainted 5.3.0-rc5+ #118 [ 205.315374][T12572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.325407][T12572] Call Trace: [ 205.328688][T12572] dump_stack+0x172/0x1f0 [ 205.334087][T12572] should_fail.cold+0xa/0x15 [ 205.338666][T12572] ? fault_create_debugfs_attr+0x180/0x180 [ 205.344490][T12572] ? page_to_nid.part.0+0x20/0x20 [ 205.355746][T12572] ? ___might_sleep+0x163/0x280 [ 205.360577][T12572] __should_failslab+0x121/0x190 [ 205.365490][T12572] should_failslab+0x9/0x14 [ 205.369971][T12572] kmem_cache_alloc_node+0x268/0x740 [ 205.375372][T12572] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 205.381083][T12572] ? widen_string+0xe0/0x2e0 [ 205.385651][T12572] ? is_bpf_text_address+0xac/0x170 [ 205.390826][T12572] __alloc_skb+0xd5/0x5e0 [ 205.395132][T12572] ? netdev_alloc_frag+0x1b0/0x1b0 [ 205.400215][T12572] ? widen_string+0xe0/0x2e0 [ 205.404781][T12572] ? set_precision+0x180/0x180 [ 205.409535][T12572] alloc_skb_with_frags+0x93/0x580 [ 205.414631][T12572] ? string_nocheck+0x1ce/0x240 [ 205.419476][T12572] sock_alloc_send_pskb+0x7ad/0x920 [ 205.424655][T12572] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 205.430529][T12572] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 205.436748][T12572] ? format_decode+0x25f/0xbc0 [ 205.441492][T12572] ? proto_register+0x8f0/0x8f0 [ 205.446320][T12572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.452545][T12572] ? number+0x957/0xc70 [ 205.456691][T12572] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 205.462563][T12572] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.468779][T12572] ? vsnprintf+0x32a/0x19a0 [ 205.473257][T12572] sock_alloc_send_skb+0x32/0x40 [ 205.478174][T12572] __ip_append_data.isra.0+0x16d5/0x30f0 [ 205.483784][T12572] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.488802][T12572] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 205.494505][T12572] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 205.500901][T12572] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.507139][T12572] ? ip_setup_cork+0x548/0x870 [ 205.511890][T12572] ip_make_skb+0x249/0x2c0 [ 205.516315][T12572] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.521350][T12572] ? ip_flush_pending_frames+0x30/0x30 [ 205.526798][T12572] ? ip_route_output_key_hash_rcu+0x2d70/0x2d70 [ 205.533024][T12572] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.539254][T12572] ? xfrm_lookup_route+0x5b/0x1f0 [ 205.544268][T12572] udp_sendmsg+0x1e3b/0x2830 [ 205.548847][T12572] ? tomoyo_check_acl+0x229/0x3e0 [ 205.553848][T12572] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.558873][T12572] ? udp_push_pending_frames+0xf0/0xf0 [ 205.564309][T12572] ? tomoyo_unix_entry+0x5d0/0x5d0 [ 205.569406][T12572] ? update_load_avg+0x1c6/0x1b10 [ 205.574413][T12572] ? tomoyo_socket_bind_permission+0x360/0x360 [ 205.580566][T12572] ? __perf_event_task_sched_in+0x1cb/0x820 [ 205.586439][T12572] ? rxrpc_send_abort_packet+0x179/0xe70 [ 205.592061][T12572] inet_sendmsg+0x9e/0xe0 [ 205.596376][T12572] ? inet_sendmsg+0x9e/0xe0 [ 205.600864][T12572] ? inet_send_prepare+0x4f0/0x4f0 [ 205.605956][T12572] sock_sendmsg+0xd7/0x130 [ 205.610350][T12572] kernel_sendmsg+0x44/0x50 [ 205.614833][T12572] rxrpc_send_abort_packet+0x479/0xe70 [ 205.620291][T12572] ? rxrpc_send_ack_packet+0x2640/0x2640 [ 205.625923][T12572] ? __kasan_check_read+0x11/0x20 [ 205.630929][T12572] ? rxrpc_release_calls_on_socket+0x6d3/0x1320 [ 205.637142][T12572] ? trace_hardirqs_on+0x67/0x240 [ 205.642144][T12572] ? __local_bh_enable_ip+0x15a/0x270 [ 205.647490][T12572] rxrpc_release_calls_on_socket+0x6db/0x1320 [ 205.653531][T12572] ? rxrpc_discard_prealloc+0x664/0xf20 [ 205.659075][T12572] ? rxrpc_release+0x39e/0x840 [ 205.664088][T12572] rxrpc_release+0x40c/0x840 [ 205.668654][T12572] __sock_release+0xce/0x280 [ 205.673218][T12572] sock_close+0x1e/0x30 [ 205.677350][T12572] __fput+0x2ff/0x890 [ 205.681305][T12572] ? __sock_release+0x280/0x280 [ 205.686138][T12572] ____fput+0x16/0x20 [ 205.690097][T12572] task_work_run+0x145/0x1c0 [ 205.694669][T12572] get_signal+0x2078/0x2500 [ 205.699147][T12572] ? fput+0x1b/0x20 [ 205.702930][T12572] ? __sys_recvfrom+0x28b/0x350 [ 205.707758][T12572] do_signal+0x87/0x1700 [ 205.711977][T12572] ? setup_sigcontext+0x7d0/0x7d0 [ 205.716974][T12572] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 205.723191][T12572] ? fput_many+0x12c/0x1a0 [ 205.727579][T12572] ? fput+0x1b/0x20 [ 205.731361][T12572] ? ksys_write+0x1cf/0x290 [ 205.735838][T12572] ? __ia32_sys_read+0xb0/0xb0 [ 205.740578][T12572] ? switch_fpu_return+0x1fa/0x4f0 [ 205.745669][T12572] ? trace_hardirqs_on+0x67/0x240 [ 205.750674][T12572] exit_to_usermode_loop+0x286/0x380 [ 205.755936][T12572] do_syscall_64+0x5a9/0x6a0 [ 205.760502][T12572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.766368][T12572] RIP: 0033:0x459879 [ 205.770234][T12572] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:10:49 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:49 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x12, 0x0) 03:10:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0}, 0x10) 03:10:49 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000000000, 0xe8030000, 0x0, 0x90) 03:10:49 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x16, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) [ 205.789809][T12572] RSP: 002b:00007f0f1cf98c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 205.798192][T12572] RAX: fffffffffffffe00 RBX: 00007f0f1cf98c90 RCX: 0000000000459879 [ 205.806139][T12572] RDX: 3f00000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 205.814084][T12572] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000090 [ 205.822031][T12572] R10: 00000000e8030000 R11: 0000000000000246 R12: 00007f0f1cf996d4 [ 205.829979][T12572] R13: 00000000004c6dab R14: 00000000004dc1d8 R15: 0000000000000004 03:10:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) 03:10:49 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x17, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:49 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0xf0, 0x0) 03:10:49 executing program 0 (fault-call:4 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:49 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x1a0, 0x0) 03:10:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x1}, 0x10) [ 206.061777][T12651] FAULT_INJECTION: forcing a failure. [ 206.061777][T12651] name failslab, interval 1, probability 0, space 0, times 0 [ 206.135262][T12651] CPU: 1 PID: 12651 Comm: syz-executor.0 Not tainted 5.3.0-rc5+ #118 [ 206.143392][T12651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.153445][T12651] Call Trace: [ 206.156736][T12651] dump_stack+0x172/0x1f0 [ 206.161080][T12651] should_fail.cold+0xa/0x15 [ 206.165682][T12651] ? fault_create_debugfs_attr+0x180/0x180 [ 206.171505][T12651] ? page_to_nid.part.0+0x20/0x20 [ 206.176540][T12651] ? ___might_sleep+0x163/0x280 [ 206.181396][T12651] __should_failslab+0x121/0x190 [ 206.186331][T12651] should_failslab+0x9/0x14 [ 206.190834][T12651] __kmalloc+0x2e0/0x770 [ 206.195077][T12651] ? bpf_prog_array_alloc+0x58/0x70 [ 206.200266][T12651] bpf_prog_array_alloc+0x58/0x70 [ 206.205284][T12651] compute_effective_progs+0x19e/0x4f0 [ 206.210731][T12651] update_effective_progs+0x56/0x390 [ 206.215999][T12651] __cgroup_bpf_attach+0x7c5/0x1640 [ 206.221181][T12651] ? cgroup_bpf_inherit+0x2c0/0x2c0 [ 206.226360][T12651] ? css_tryget_online_from_dir+0xe9/0x7c0 [ 206.232156][T12651] cgroup_bpf_attach+0x3c/0x60 [ 206.236902][T12651] cgroup_bpf_prog_attach+0xca/0x3a0 [ 206.242192][T12651] __do_sys_bpf+0x1960/0x3460 [ 206.246852][T12651] ? bpf_prog_load+0x1670/0x1670 [ 206.251768][T12651] ? __kasan_check_write+0x14/0x20 [ 206.256858][T12651] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 206.262379][T12651] ? wait_for_completion+0x440/0x440 [ 206.267665][T12651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 206.273889][T12651] ? fput_many+0x12c/0x1a0 [ 206.278291][T12651] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 206.284340][T12651] __x64_sys_bpf+0x73/0xb0 [ 206.288738][T12651] do_syscall_64+0xfd/0x6a0 [ 206.293221][T12651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.299089][T12651] RIP: 0033:0x459879 [ 206.302966][T12651] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.322547][T12651] RSP: 002b:00007f75153b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 206.330933][T12651] RAX: ffffffffffffffda RBX: 00007f75153b6c90 RCX: 0000000000459879 [ 206.338880][T12651] RDX: 0000000000000010 RSI: 0000000020000100 RDI: 0000000000000008 [ 206.346841][T12651] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.354789][T12651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75153b76d4 [ 206.362751][T12651] R13: 00000000004bfb84 R14: 00000000004d1840 R15: 0000000000000007 03:10:50 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000003f00, 0xe8030000, 0x0, 0x90) 03:10:50 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x18, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:50 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x600, 0x0) 03:10:50 executing program 0 (fault-call:4 fault-nth:1): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0}, 0x10) 03:10:50 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f00000000003f00, 0xe8030000, 0x0, 0x90) 03:10:50 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x826, 0x0) 03:10:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0}, 0x10) 03:10:50 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x19, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:50 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0xc00, 0x0) 03:10:50 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f0000003f000000, 0xe8030000, 0x0, 0x90) 03:10:50 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x1e, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fdb4b0a008a8443f22772dd45c7e6dd329e4a0587536a9669924c83415c44024b5af7e1eb12e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b5455feaa82bbfc33de12fbbe7decc4aa61b8aad03590e8d560bb4b5925fae801f4c91e31674b124a1b3b0000000012278fb86208000000f4a7a72900d07364a3f6da9fff0d41ac79fdd84abbec7d96629491727375b853d3ffafb1c72b19ab3f2e9b357b9e3b080061fbe0131f3c7a026d8f00000000000000000000000bd72ae9fc3cc004a109ffddc65c1b1b328277ff85ed56b9261eb7bceec6e6000000009ab3f307849eebce6f21e6302003c0467844e006ee80631163265e56db9a28bd694a092f53a1c6c7863d3b9cd5062b1beda7ab706979000000000092f5b690bae8e175686a2ad1ae182f7003a3549bf9f33cf029558d209bd628385c27591dade2eceefb8d66850a7247de343ecdfefbab5bc5ec8a3b8cba47ffc1bdcb9b970dc454185362407b916d039477d0815c00db43d0762f7b68a4791de33ff994b7824afdbb33da5aa3c4e5786db04a2c2417997107456b0591809b9523c60d62ca2658869d4bf16f0b46eeedf1481f9a25e75581f89daf2bcd37e593950e8787baaaafa82df1a06340575988b02232d56ba87f2a2c5544"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r0}, 0x10) 03:10:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x2, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:50 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x1200, 0x0) 03:10:50 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x21, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfe57, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\x00yz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x3, &(0x7f0000000100)={r1, r0, 0x1}, 0x10) 03:10:51 executing program 1: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x17, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:51 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x2608, 0x0) 03:10:51 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6ff17b91c3b0d873722b41a118fd58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1baf272a416e63e58afdf284732bd1e1970000000009f313c4957c67a08676517ba1300000000858003ffffffffffffffff3e26b5ca26b5434dbd0e4885c214e577bb081876e63e7c2834533925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e40000000000d5a0a5c33d3cc0b2eeedde5233ac82d4f7de00c26cb542f13b5bc18adcfb59dfb5edff90d0a500a0defa7af4fea59c878c765f6a084b83a0c37596366d369187f444"], 0x18}}], 0x1, 0x4048000) recvfrom$rxrpc(r0, 0x0, 0x3f0000003f000000, 0xe8030000, 0x0, 0x90) 03:10:51 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000080), 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x22, &(0x7f00000018c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@rand_addr="f5df60a3adf2eb3c88aa1a014e85e9e3", 0x0, 0x32}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0xe8) 03:10:51 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) clone(0xffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file1\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x3f00, 0x0) [ 207.608202][T12742] ------------[ cut here ]------------ [ 207.614265][T12742] WARNING: CPU: 1 PID: 12742 at include/net/sock.h:666 smc_unhash_sk.cold+0x11/0x18 [ 207.623651][T12742] Kernel panic - not syncing: panic_on_warn set ... [ 207.630247][T12742] CPU: 1 PID: 12742 Comm: syz-executor.2 Not tainted 5.3.0-rc5+ #118 [ 207.638308][T12742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.640915][ T3905] kobject: 'loop5' (00000000121ea587): kobject_uevent_env [ 207.648360][T12742] Call Trace: [ 207.658742][T12742] dump_stack+0x172/0x1f0 [ 207.663078][T12742] ? smc_listen_work+0x1580/0x15a3 [ 207.666458][ T3905] kobject: 'loop5' (00000000121ea587): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 207.668190][T12742] panic+0x2dc/0x755 [ 207.668207][T12742] ? add_taint.cold+0x16/0x16 [ 207.686892][T12742] ? __kasan_check_write+0x14/0x20 [ 207.692005][T12742] ? __warn.cold+0x5/0x4c [ 207.696342][T12742] ? __warn+0xe7/0x1e0 [ 207.700415][T12742] ? smc_unhash_sk.cold+0x11/0x18 [ 207.705439][T12742] __warn.cold+0x20/0x4c [ 207.709680][T12742] ? wake_up_klogd+0x99/0xd0 [ 207.714275][T12742] ? smc_unhash_sk.cold+0x11/0x18 [ 207.719302][T12742] report_bug+0x263/0x2b0 [ 207.723631][T12742] do_error_trap+0x11b/0x200 [ 207.728221][T12742] do_invalid_op+0x37/0x50 [ 207.732636][T12742] ? smc_unhash_sk.cold+0x11/0x18 [ 207.737670][T12742] invalid_op+0x23/0x30 [ 207.741826][T12742] RIP: 0010:smc_unhash_sk.cold+0x11/0x18 [ 207.746452][ T3905] kobject: 'loop0' (000000003db7deb4): kobject_uevent_env [ 207.747454][T12742] Code: 89 ff e8 bf 5c a6 fa e9 d7 f8 ff ff 4c 89 ff e8 b2 5c a6 fa e9 57 fa ff ff e8 d8 49 6c fa 48 c7 c7 20 37 42 88 e8 a0 ea 55 fa <0f> 0b e9 ad 43 ff ff e8 c0 49 6c fa 48 c7 c7 20 37 42 88 e8 88 ea [ 207.774232][T12742] RSP: 0018:ffff8880529a7d00 EFLAGS: 00010282 [ 207.780277][T12742] RAX: 0000000000000024 RBX: ffff8880922732c0 RCX: 0000000000000000 [ 207.788226][T12742] RDX: 0000000000000000 RSI: ffffffff815c2526 RDI: ffffed100a534f92 [ 207.796177][T12742] RBP: ffff8880529a7d30 R08: 0000000000000024 R09: ffffed1015d260d1 [ 207.804123][T12742] R10: ffffed1015d260d0 R11: ffff8880ae930687 R12: ffff888092273340 [ 207.812071][T12742] R13: ffffffff8999dfc0 R14: ffff8880922732e8 R15: 0000000000000001 [ 207.820037][T12742] ? vprintk_func+0x86/0x189 [ 207.824623][T12742] __smc_release+0x202/0x450 [ 207.829236][T12742] smc_release+0x10c/0x380 [ 207.833632][T12742] __sock_release+0xce/0x280 [ 207.838212][T12742] sock_close+0x1e/0x30 [ 207.842346][T12742] __fput+0x2ff/0x890 [ 207.846304][T12742] ? __sock_release+0x280/0x280 [ 207.851132][T12742] ____fput+0x16/0x20 [ 207.855088][T12742] task_work_run+0x145/0x1c0 [ 207.859672][T12742] exit_to_usermode_loop+0x316/0x380 [ 207.864935][T12742] do_syscall_64+0x5a9/0x6a0 [ 207.869503][T12742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.875371][T12742] RIP: 0033:0x413561 [ 207.879243][T12742] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 207.898820][T12742] RSP: 002b:00007ffe630a4730 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 207.907204][T12742] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413561 [ 207.915152][T12742] RDX: 0000001b2f920000 RSI: 0000000000000000 RDI: 0000000000000003 [ 207.923100][T12742] RBP: 0000000000000001 R08: 0000000034f7e3fb R09: 0000000034f7e3ff [ 207.931047][T12742] R10: 00007ffe630a4810 R11: 0000000000000293 R12: 000000000075bf20 [ 207.939006][T12742] R13: 0000000000032ae3 R14: 0000000000760fa0 R15: ffffffffffffffff [ 207.948199][T12742] Kernel Offset: disabled [ 207.952518][T12742] Rebooting in 86400 seconds..