0000000)={0x1c, 0x1c, 0x3}, 0x1c) 16:49:53 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_buf(r0, 0x29, 0x1c, 0x0, 0x0) 16:49:53 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) 16:49:53 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000001540)={&(0x7f0000000240)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001500)=[@dstaddrv4={0x10, 0x84, 0x9, @broadcast}], 0x10}, 0x0) 16:49:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000300)={@rand_addr, @loopback}, 0xc) 16:49:53 executing program 5: r0 = socket(0x2, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000140), &(0x7f0000000200)=0x10) 16:49:53 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000000)="cf42e904626e853f", 0x8, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 16:49:53 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x30, 0x0, 0x0) 16:49:53 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x28, 0x0, 0x0) 16:49:53 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000003700)={@local, @empty, @val, {@ipv6}}, 0x0) 16:49:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000100)=ANY=[@ANYBLOB="1002"], 0x94) 16:49:53 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xc5, 0x1c, 0x3}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 16:49:53 executing program 1: setitimer(0x0, &(0x7f0000000200)={{0x0, 0x100000001}, {0x101}}, 0x0) 16:49:53 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001800)={&(0x7f0000000100)=@file={0xa}, 0xa, &(0x7f0000001640)=[{&(0x7f0000000140)="8e", 0x1}, {0x0}, {&(0x7f0000000540)='\v', 0x1}], 0x3}, 0x0) 16:49:53 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) read(r0, &(0x7f00000000c0)=""/82, 0x52) 16:49:53 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @empty, @val, {@ipv6}}, 0x0) 16:49:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000040)=@un=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000000140)=[{0x10}], 0x10}, 0x0) 16:49:54 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_buf(r1, 0x29, 0x1c, &(0x7f0000000340)="510f22f552027df2e26f9f1c53e4aea4", 0x10) 16:49:54 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast, @remote, @val, {@arp={0x806, @generic={0x18, 0x0, 0x6, 0x0, 0x0, @local, "", @empty, "bc10f7e01a47d34d8e79ba6ef2efa214"}}}}, 0x0) 16:49:54 executing program 2: syz_emit_ethernet(0x76, &(0x7f0000000780)={@local, @empty, @val, {@ipv6}}, 0x0) 16:49:54 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x14, &(0x7f0000000240), 0x4) 16:49:54 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:49:54 executing program 4: chown(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 16:49:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000080)={0x0, 0x2}, 0x8) 16:49:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xe, 0x0, 0x0) 16:49:54 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x8, 0x1, "8e"}, 0x9) 16:49:54 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000000)="cf42e904626e853f", 0x8, 0x10d, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 16:49:54 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x84, &(0x7f0000000140)={0x1c, 0x1c, 0x1}, 0x1c) 16:49:54 executing program 3: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') r0 = open$dir(&(0x7f0000002480)='.\x00', 0x0, 0x0) utimensat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x200) 16:49:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000140)='=', 0x1}], 0x1, &(0x7f0000000280)=[{0x10}], 0x10}, 0x0) 16:49:54 executing program 1: getrlimit(0xc3c544c2ac91a3d0, 0x0) 16:49:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 16:49:54 executing program 0: syz_emit_ethernet(0x184, &(0x7f0000000340)={@broadcast, @empty, @val, {@ipv6}}, 0x0) 16:49:54 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1c, 0x1c, 0x2}, 0x1c) 16:49:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000440)=""/154, 0x9a}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1014a, 0x0, 0x0, 0x800e00515) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f000001b0c0)=""/102396, 0x18ffc}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) recvfrom$inet(r3, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r2, 0x0) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r4, 0x0) accept4(r4, &(0x7f0000000240)=ANY=[], &(0x7f0000001080), 0x0) shutdown(r3, 0x0) 16:49:54 executing program 1: chown(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 16:49:54 executing program 4: setrlimit(0x8, &(0x7f0000001380)={0x30de8ffe, 0x3cb62ebe}) 16:49:54 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 16:49:54 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000001540)={&(0x7f0000000240)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001500)=[@sndinfo={0x1c}, @dstaddrv4={0x10, 0x84, 0x9, @broadcast}], 0x2c}, 0x0) 16:49:54 executing program 1: setrlimit(0xc49485bab3c46dd3, &(0x7f0000000040)) 16:49:54 executing program 3: bind$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xfffffffffffffd94, 0x1c, 0x2}, 0xffffffffffffff18) 16:49:54 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000003700)={@local, @empty, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @broadcast, @broadcast, @loopback}}}}, 0x0) 16:49:54 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@broadcast, @remote, @val, {@ipv6}}, 0x0) 16:49:54 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:49:54 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000140)={{}, {0x0, 0x100000000}}, 0x0) 16:49:54 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x10, &(0x7f0000000000), 0x4) 16:49:55 executing program 5: syz_emit_ethernet(0x4de, &(0x7f0000003700)={@local, @empty, @val, {@ipv6}}, 0x0) 16:49:55 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000400)=ANY=[@ANYBLOB="aaaaaaaaaabbaaaaaaaaaabb81001b0008060001080006040004aaaaaaaaaabb"], 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000240), 0x5e, 0x0, 0xffffffa7}, 0x0) 16:49:55 executing program 4: syz_emit_ethernet(0x62, &(0x7f0000000000)={@local, @local, @val, {@ipv4}}, 0x0) 16:49:55 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x5, 0xff9, "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"}, 0x1001) 16:49:55 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @remote, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @loopback, @local, @rand_addr=0x8}}}}, 0x0) 16:49:55 executing program 1: syz_emit_ethernet(0x86, &(0x7f0000000780)={@local, @random="e11b2cdd5d12", @val, {@ipv6}}, 0x0) 16:49:55 executing program 1: syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @remote, @val, {@ipv6}}, 0x0) 16:49:55 executing program 4: clock_settime(0x0, &(0x7f0000000040)) clock_getres(0x1, &(0x7f0000000000)) 16:49:55 executing program 0: syz_emit_ethernet(0x91, &(0x7f00000000c0)={@local, @empty, @val, {@ipv6}}, 0x0) 16:49:55 executing program 5: r0 = socket(0x2, 0x3, 0x0) bind(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 16:49:55 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) 16:49:55 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000001540)={&(0x7f0000000240)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001500)=[@init={0x14}], 0x14}, 0x0) 16:49:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 16:49:55 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@sndinfo={0x1c}], 0x1c}, 0x0) 16:49:55 executing program 0: syz_emit_ethernet(0x9a, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) 16:49:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x52, 0x0, 0x0) 16:49:55 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_int(r1, 0x29, 0x2b, &(0x7f0000000040), 0x4) 16:49:55 executing program 3: syz_emit_ethernet(0x1fff, &(0x7f0000003700)={@local, @empty, @val, {@ipv6}}, 0x0) 16:49:55 executing program 5: rename(&(0x7f00000000c0)='./file0\x00', 0x0) 16:49:55 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x8, 0x0) 16:49:55 executing program 0: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x4) 16:49:55 executing program 1: open$dir(&(0x7f0000002480)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x0) 16:49:55 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x14, &(0x7f0000000240)={0x1, [0x0]}, 0x6) 16:49:55 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="a4", 0x1, 0x85, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 16:49:55 executing program 4: 16:49:56 executing program 1: 16:49:56 executing program 2: 16:49:56 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@getsadinfo={0x14, 0x23, 0x1}, 0x14}}, 0x0) 16:49:56 executing program 1: r0 = socket(0x2, 0x5, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0xa}, 0xa) 16:49:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@generic={0x1, 0x0, 0x2}) 16:49:56 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 16:49:56 executing program 3: 16:49:56 executing program 0: 16:49:56 executing program 5: 16:49:56 executing program 1: 16:49:56 executing program 2: 16:49:56 executing program 3: 16:49:56 executing program 0: 16:49:56 executing program 4: 16:49:56 executing program 1: 16:49:56 executing program 5: 16:49:56 executing program 3: 16:49:56 executing program 2: 16:49:56 executing program 4: 16:49:56 executing program 0: 16:49:56 executing program 3: 16:49:56 executing program 2: 16:49:56 executing program 5: 16:49:56 executing program 1: 16:49:56 executing program 4: 16:49:56 executing program 5: 16:49:56 executing program 0: 16:49:56 executing program 2: 16:49:56 executing program 3: 16:49:56 executing program 1: 16:49:56 executing program 4: 16:49:56 executing program 2: 16:49:56 executing program 0: 16:49:56 executing program 4: 16:49:56 executing program 3: 16:49:56 executing program 5: 16:49:56 executing program 1: 16:49:56 executing program 0: 16:49:56 executing program 2: 16:49:56 executing program 1: 16:49:56 executing program 3: 16:49:56 executing program 4: 16:49:56 executing program 5: 16:49:56 executing program 0: 16:49:56 executing program 1: 16:49:56 executing program 2: 16:49:57 executing program 4: 16:49:57 executing program 3: 16:49:57 executing program 0: 16:49:57 executing program 5: 16:49:57 executing program 1: 16:49:57 executing program 4: 16:49:57 executing program 1: 16:49:57 executing program 3: 16:49:57 executing program 2: 16:49:57 executing program 5: 16:49:57 executing program 0: 16:49:57 executing program 4: 16:49:57 executing program 3: 16:49:57 executing program 1: 16:49:57 executing program 2: 16:49:57 executing program 5: 16:49:57 executing program 0: 16:49:57 executing program 4: 16:49:57 executing program 3: 16:49:57 executing program 1: 16:49:57 executing program 5: 16:49:57 executing program 2: 16:49:57 executing program 0: 16:49:57 executing program 4: 16:49:57 executing program 3: 16:49:57 executing program 1: 16:49:57 executing program 5: 16:49:57 executing program 2: 16:49:57 executing program 0: 16:49:57 executing program 1: 16:49:57 executing program 4: 16:49:57 executing program 5: 16:49:57 executing program 3: 16:49:57 executing program 2: 16:49:57 executing program 3: 16:49:57 executing program 1: 16:49:57 executing program 0: 16:49:57 executing program 2: 16:49:57 executing program 5: 16:49:57 executing program 4: 16:49:57 executing program 3: 16:49:57 executing program 1: 16:49:57 executing program 0: 16:49:57 executing program 2: 16:49:57 executing program 5: 16:49:57 executing program 4: 16:49:57 executing program 1: 16:49:58 executing program 3: 16:49:58 executing program 2: 16:49:58 executing program 0: 16:49:58 executing program 4: 16:49:58 executing program 5: 16:49:58 executing program 1: 16:49:58 executing program 3: 16:49:58 executing program 2: 16:49:58 executing program 0: 16:49:58 executing program 4: 16:49:58 executing program 2: 16:49:58 executing program 5: 16:49:58 executing program 1: 16:49:58 executing program 3: 16:49:58 executing program 0: 16:49:58 executing program 1: 16:49:58 executing program 4: 16:49:58 executing program 5: 16:49:58 executing program 2: 16:49:58 executing program 3: 16:49:58 executing program 0: 16:49:58 executing program 5: 16:49:58 executing program 1: 16:49:58 executing program 0: 16:49:58 executing program 4: 16:49:58 executing program 2: 16:49:58 executing program 3: 16:49:58 executing program 5: 16:49:58 executing program 4: 16:49:58 executing program 0: 16:49:58 executing program 1: 16:49:58 executing program 2: 16:49:58 executing program 5: 16:49:58 executing program 3: 16:49:58 executing program 5: 16:49:58 executing program 4: 16:49:58 executing program 2: 16:49:58 executing program 1: 16:49:58 executing program 0: 16:49:58 executing program 3: 16:49:58 executing program 5: 16:49:58 executing program 1: 16:49:58 executing program 4: 16:49:58 executing program 2: 16:49:58 executing program 0: 16:49:58 executing program 5: 16:49:58 executing program 3: 16:49:59 executing program 4: 16:49:59 executing program 2: 16:49:59 executing program 1: 16:49:59 executing program 0: 16:49:59 executing program 5: 16:49:59 executing program 5: 16:49:59 executing program 3: 16:49:59 executing program 1: 16:49:59 executing program 2: 16:49:59 executing program 0: 16:49:59 executing program 4: 16:49:59 executing program 3: 16:49:59 executing program 1: 16:49:59 executing program 5: 16:49:59 executing program 0: 16:49:59 executing program 4: 16:49:59 executing program 2: 16:49:59 executing program 3: 16:49:59 executing program 1: 16:49:59 executing program 5: 16:49:59 executing program 2: 16:49:59 executing program 0: 16:49:59 executing program 3: 16:49:59 executing program 4: 16:49:59 executing program 3: 16:49:59 executing program 1: 16:49:59 executing program 5: 16:49:59 executing program 4: 16:49:59 executing program 0: 16:49:59 executing program 2: 16:49:59 executing program 1: 16:49:59 executing program 4: 16:49:59 executing program 0: 16:49:59 executing program 3: 16:49:59 executing program 5: 16:49:59 executing program 2: 16:49:59 executing program 4: 16:49:59 executing program 1: 16:49:59 executing program 3: 16:49:59 executing program 5: 16:49:59 executing program 0: 16:49:59 executing program 3: 16:49:59 executing program 4: 16:49:59 executing program 5: 16:49:59 executing program 1: 16:49:59 executing program 2: 16:49:59 executing program 0: 16:49:59 executing program 4: 16:50:00 executing program 5: 16:50:00 executing program 3: 16:50:00 executing program 2: 16:50:00 executing program 1: 16:50:00 executing program 5: 16:50:00 executing program 0: 16:50:00 executing program 4: 16:50:00 executing program 1: 16:50:00 executing program 3: 16:50:00 executing program 2: 16:50:00 executing program 5: 16:50:00 executing program 0: 16:50:00 executing program 4: 16:50:00 executing program 3: 16:50:00 executing program 1: 16:50:00 executing program 2: 16:50:00 executing program 5: 16:50:00 executing program 4: 16:50:00 executing program 0: 16:50:00 executing program 3: 16:50:00 executing program 1: 16:50:00 executing program 5: 16:50:00 executing program 4: 16:50:00 executing program 2: 16:50:00 executing program 3: 16:50:00 executing program 0: 16:50:00 executing program 1: 16:50:00 executing program 2: 16:50:00 executing program 5: 16:50:00 executing program 4: 16:50:00 executing program 1: 16:50:00 executing program 0: 16:50:00 executing program 3: 16:50:00 executing program 5: 16:50:00 executing program 4: 16:50:00 executing program 2: 16:50:00 executing program 1: 16:50:00 executing program 0: 16:50:00 executing program 3: 16:50:00 executing program 1: 16:50:00 executing program 4: 16:50:00 executing program 2: 16:50:00 executing program 5: 16:50:00 executing program 1: 16:50:00 executing program 0: 16:50:00 executing program 3: 16:50:01 executing program 4: 16:50:01 executing program 2: 16:50:01 executing program 5: 16:50:01 executing program 0: 16:50:01 executing program 1: 16:50:01 executing program 3: 16:50:01 executing program 5: 16:50:01 executing program 4: 16:50:01 executing program 2: 16:50:01 executing program 0: 16:50:01 executing program 4: 16:50:01 executing program 1: 16:50:01 executing program 3: 16:50:01 executing program 5: 16:50:01 executing program 2: 16:50:01 executing program 0: 16:50:01 executing program 4: 16:50:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000001ac0)=""/253, 0x32, 0xfd, 0xfffffffd}, 0x20) 16:50:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000001300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@typedef={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f00000025c0)=""/219, 0x2a, 0xdb, 0x1}, 0x20) 16:50:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000ac0)=""/141, 0x26, 0x8d, 0x8}, 0x20) 16:50:01 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:01 executing program 4: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000400)={0xffe00000}, 0x8) 16:50:01 executing program 3: socketpair(0x22, 0x0, 0x7, &(0x7f0000000580)) 16:50:01 executing program 0: 16:50:01 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0x0, 0x0, 0x0, 0x420}, 0x40) 16:50:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000005f80)={0x0, 0x0, 0x0}, 0x40) 16:50:01 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 16:50:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 16:50:01 executing program 2: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000020940)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x40) 16:50:01 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}, 0x0) 16:50:01 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x6000000}]}}, &(0x7f0000000ac0)=""/141, 0x26, 0x8d, 0x1}, 0x20) 16:50:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x1, &(0x7f0000000180)=@raw=[@generic={0x5, 0x0, 0x0, 0xa733}], &(0x7f0000000200)='syzkaller\x00', 0x5, 0xbd, &(0x7f0000000240)=""/189, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f00000001c0)='g', 0x1}, {&(0x7f0000000200)="ce", 0x1}], 0x3}, 0x0) 16:50:01 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f0000000180)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001300)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000001240)=[{&(0x7f00000000c0)="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", 0xffd}, {&(0x7f00000010c0)="af83f3b036e02ef76e4ff561748ab93ec9025d1db4290d9b1e75a6cb5a1dd812bd8039a13458916383559acfb8009243c6e79982e9b5e839becae7d425582fb27d504e6f4c4da26c", 0x48}, {&(0x7f0000001140)="f44e8e0d8f83b23be02a2dc8a9d06f677f0f6fe0d4b3e03bced8a0d997cf2599ec50494343844b4820d0bd825cc217b3f06d0dfffc27339cca7e1b27edf097a5d7dad74aae1adad56b9d1cddda229cc72db2f10ddf3fad6a50d6bc6203c6960c2fc6a9c9494864502dc0b59e6026a7b5284cec733c3854f6cb5cd4898e77642c1e52bd2bb897718ba6925deef28ba3ee9736d7648ab0cc086c744af74dbbf49018b2782636b07e729d3658315de9d7cca232540f9344f8bc9caf422eae8f2927a175fc632b83aa0fae5aaeb3b8eca349b400808513a3f5a552f73eda119323729e8a737ed0", 0xe5}], 0x3, &(0x7f0000001280)=[@timestamping={{0xb}}, @mark={{0x14}}, @timestamping={{0x14}}], 0x48}, 0x0) 16:50:01 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') 16:50:01 executing program 3: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:50:01 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@timestamping={{0x14}}], 0x18}, 0x0) 16:50:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000001ac0)=""/253, 0x2a, 0xfd, 0x1}, 0x20) 16:50:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="aca7e35a4931"], &(0x7f0000000100)=""/250, 0x67, 0xfa, 0x10001}, 0x20) 16:50:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000001ac0)=""/253, 0x18, 0xfd, 0x1}, 0x20) 16:50:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000003ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1, 0x0, 0x0, 0x1, 0x0, 0x57, 0x0, 0x7e, 0x3}]}}, &(0x7f0000000100)=""/4085, 0x2a, 0xff5, 0x1}, 0x20) 16:50:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="d80000006400810de00f80ecdb4cb9040a4425ef0b067c05e87c55a1bc000900b8000699030000000500150007008178a800160040003cc00200001203ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1, 0x0, 0x0, 0x4}, 0x0) 16:50:02 executing program 2: socketpair(0x15, 0x0, 0x0, &(0x7f0000000240)) 16:50:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000c80)='\v', 0x1}], 0x2, &(0x7f0000000d00)=[{0x18, 0x0, 0x0, ','}, {0x10}], 0x28}, 0x0) 16:50:02 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x5}, 0x10) 16:50:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x9, 0x1, &(0x7f0000000180)=@raw=[@jmp], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:50:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001ac0)=""/253, 0x1a, 0xfd, 0x1}, 0x20) 16:50:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000ac0)=""/141, 0x26, 0x8d, 0x1}, 0x20) [ 291.579552] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. 16:50:02 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000200060ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 16:50:02 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x1, &(0x7f00000002c0)=@raw=[@generic], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 291.646072] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. 16:50:02 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0xbf00, &(0x7f00000002c0)=@raw=[@generic], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x8c, &(0x7f0000000340)=""/140, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xe000000, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207a07e4f1e000000880306fb0a000200060ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 16:50:02 executing program 1: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000480)) 16:50:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x1}]}}, &(0x7f0000000540)=""/185, 0x26, 0xb9, 0x1}, 0x20) [ 291.735926] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 16:50:02 executing program 5: socketpair(0x6, 0x0, 0x0, &(0x7f0000000280)) [ 291.810254] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. [ 291.845976] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. 16:50:02 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002f80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000026c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10, 0x0}, 0x0) 16:50:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1e8}, 0x0) 16:50:03 executing program 2: socketpair(0x10, 0x2, 0x0, &(0x7f00000001c0)) 16:50:03 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) [ 291.892318] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. 16:50:03 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003a40)={0x11, 0x5, &(0x7f0000001140)=@raw=[@initr0, @generic={0x64}, @exit, @call], &(0x7f00000011c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x0, 0xfffffffd}, 0x40) 16:50:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/222, 0x2e, 0xde, 0x1}, 0x20) 16:50:03 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101201, 0x0) 16:50:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000ac0)=""/141, 0x2b, 0x8d, 0x1}, 0x20) 16:50:03 executing program 0: unlink(&(0x7f0000000000)='./file0\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x8}, 0x10) 16:50:03 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:03 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x1098c0, 0x0) 16:50:03 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 16:50:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/cgroup\x00') 16:50:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000ac0)=""/133, 0x26, 0x85, 0x1}, 0x20) 16:50:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x1, &(0x7f0000000080)=@raw=[@generic], &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000bc0)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000001ac0)=""/253, 0x2a, 0xfd, 0x1}, 0x20) 16:50:03 executing program 3: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:50:03 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}, 0x40000040) 16:50:03 executing program 4: socketpair(0x22, 0x0, 0x4, &(0x7f0000000080)) 16:50:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002"], &(0x7f0000000ac0)=""/141, 0x26, 0x8d, 0x1}, 0x20) 16:50:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000010600)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x6, 0xaf, &(0x7f0000000080)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f0000000ac0)=""/141, 0x26, 0x8d, 0x1}, 0x20) 16:50:03 executing program 3: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004980)={0x0, 0x0, 0x0}, 0x0) 16:50:03 executing program 4: socketpair(0x1e, 0x0, 0x2, &(0x7f0000000000)) 16:50:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a4c6, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001680)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000680)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001ec0)=ANY=[@ANYBLOB="b800000000000000ff0000000900000017225295cab68cea85bdaf5cd7434a4994c215ef514676f6ce59090e0fefe49cceb3fd9d793a5f3a64c63750825e3b5e623032b1080182169b000f04f4dc48286e979ae38a33b2f72984d68a998274161f8a9bbd4fd026151985a367ac733267e6aa062fecbb460361924603708bd69117713d2956bf2c33b005e03191c055d3c66a7a3ccfa4cfe00e1e83bffde2a6bee40b60720a1565515fd5de000000000028000000000000000000000003"], 0x1e8}, 0x0) 16:50:03 executing program 2: socketpair(0x10, 0x0, 0x0, &(0x7f00000001c0)) 16:50:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001ec0)=ANY=[], 0x1e8}, 0x0) 16:50:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'veth0_macvtap\x00'}) 16:50:03 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000003540)) 16:50:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x6, 0x3}]}}, &(0x7f0000000ac0)=""/141, 0x26, 0x8d, 0x1}, 0x20) 16:50:03 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x2, &(0x7f0000000000)=@raw=[@initr0], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xa8, &(0x7f0000000080)=""/168, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000400), 0x4) 16:50:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x4f, 0x6}]}}, &(0x7f0000001ac0)=""/253, 0x2a, 0xfd, 0x1}, 0x20) 16:50:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004980)={0x0, 0x0, &(0x7f00000048c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40000160) 16:50:04 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@cgroup, 0xffffffffffffffff, 0x1c}, 0x10) 16:50:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/net/tun\x00', 0x0, 0x0) close(r0) 16:50:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000ac0)=""/137, 0x28, 0x89, 0x1}, 0x20) 16:50:04 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:50:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000c80)='\v', 0x1}], 0x2, &(0x7f0000000d00)=[{0x10}], 0x10}, 0x0) 16:50:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x5f5e0ff, 0x2, [@int]}}, &(0x7f0000001ac0)=""/253, 0x2a, 0xfd, 0x1}, 0x20) 16:50:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @remote}}}], 0x20}, 0x0) 16:50:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:04 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001440)={&(0x7f00000003c0)=@id, 0x10, &(0x7f0000001400)=[{&(0x7f0000000400)="88", 0x1}], 0x1}, 0x88c1) 16:50:04 executing program 1: socketpair(0x21, 0x0, 0x0, &(0x7f00000002c0)) 16:50:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003a40)={0x11, 0x1, &(0x7f0000001140)=@raw=[@generic], &(0x7f00000011c0)='GPL\x00', 0x0, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:04 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000080)="e7", 0x1}], 0x2}, 0x0) 16:50:04 executing program 0: socketpair(0x18, 0x0, 0x401, &(0x7f0000000000)) 16:50:04 executing program 4: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000006c0)="022ac801af6920853f13a72ee10db49e3a4f17e42b3f4b3f709560205f2307a41372f30af7413050ca60668a828d2ac5967d4e8dc1", 0x35}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x100002, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:50:04 executing program 1: socketpair(0x10, 0x0, 0x0, &(0x7f00000003c0)) 16:50:04 executing program 4: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x84) 16:50:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x0, 0x0, 0x0, 0x81}, 0x40) 16:50:04 executing program 3: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff04000000000000000000000000002100000000000000", 0x30}], 0x1}, 0x0) 16:50:04 executing program 2: socketpair(0x10, 0x2, 0x4, &(0x7f00000001c0)) 16:50:04 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 16:50:04 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000780)={&(0x7f0000000180)=@name, 0x10, 0x0}, 0x0) 16:50:04 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000001780)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:50:04 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, 0x0}, 0x20) 16:50:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000680)) r2 = socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80, 0x0}, 0x20008041) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x26e1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') 16:50:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005640)={0x18, 0x5, &(0x7f0000000080)=@raw=[@func, @func, @initr0, @call], &(0x7f0000000100)='GPL\x00', 0x7, 0x90, &(0x7f0000000140)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000001ac0)=""/253, 0x1a, 0xfd, 0x1}, 0x20) 16:50:05 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002f80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000026c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x10, &(0x7f0000002540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:50:05 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:05 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 16:50:05 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0x0, 0x0, 0x7}, 0x40) 16:50:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x86) 16:50:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0xd}, {0x10, 0x1}]}]}}, &(0x7f0000000080)=""/222, 0x3e, 0xde, 0x1}, 0x20) 16:50:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002"], &(0x7f0000001ac0)=""/253, 0x2a, 0xfd, 0x1}, 0x20) 16:50:05 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x181, 0x0) [ 294.542321] device syzkaller1 entered promiscuous mode 16:50:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004980)={0x0, 0x0, 0x0}, 0x0) 16:50:05 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:50:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8eb2d589b710920, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 16:50:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003a40)={0x11, 0x7, &(0x7f0000001140)=@raw=[@generic={0x64}, @map, @map={0x18, 0xa}, @call={0x85, 0x0, 0x0, 0x48}, @jmp], &(0x7f00000011c0)='GPL\x00', 0x5, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 16:50:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1}, {0xd}, {0x10, 0x1}]}]}}, &(0x7f0000000080)=""/222, 0x3e, 0xde, 0x1}, 0x20) 16:50:05 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x1, &(0x7f00000002c0)=@raw=[@generic], &(0x7f0000000300)='syzkaller\x00', 0x9, 0x8c, &(0x7f0000000340)=""/140, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000000540)=""/185, 0x26, 0xb9, 0x1}, 0x20) 16:50:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7}, 0x40) 16:50:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0x1, &(0x7f00000002c0)=@raw=[@generic], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x43], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:06 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)=':\x00') 16:50:06 executing program 4: bpf$BPF_BTF_LOAD(0x1a, 0x0, 0x0) 16:50:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x1, 0xe, 0x0, &(0x7f0000001480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000000040)=""/162, 0x29, 0xa2, 0x1}, 0x20) 16:50:06 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb0100180000000000000010000000100000000200000000e6b474458d97"], &(0x7f0000001ac0)=""/253, 0x2a, 0xfd, 0x1}, 0x20) 16:50:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:06 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x9, 0x2, &(0x7f0000000180)=@raw=[@initr0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000ac0)=""/141, 0x32, 0x8d, 0x1}, 0x20) 16:50:06 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 16:50:06 executing program 4: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000b80)={0x0, &(0x7f0000000ac0)=""/141, 0x0, 0x8d}, 0x20) mkdir(&(0x7f0000000080)='./file0\x00', 0x60) 16:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000008000000080000000040000000200000001000006"], &(0x7f0000000ac0)=""/141, 0x9c, 0x8d, 0x1}, 0x20) 16:50:06 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000bc0)="be", 0x1}, {&(0x7f0000000080)="e7", 0x1}], 0x2}, 0x0) 16:50:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) 16:50:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) 16:50:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000010600)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x6, 0xaf, &(0x7f0000000080)=""/175, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000010580), 0x8, 0x10, 0x0}, 0x78) 16:50:07 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000035c0)={0x17, 0x0, 0x8000, 0x4, 0x108}, 0x40) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f00000035c0)={0xa, 0x2, 0x8000, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x2]}, 0x40) 16:50:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) 16:50:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000003ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x57}]}}, &(0x7f0000000100)=""/4085, 0x2a, 0xff5, 0x1}, 0x20) 16:50:07 executing program 3: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:50:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:07 executing program 3: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='sys_enter\x00', r0}, 0x10) 16:50:07 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/time\x00') 16:50:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xa}, 0x40) 16:50:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000180)=0x3f) 16:50:07 executing program 0: socketpair(0x26, 0x5, 0x1, &(0x7f0000000000)) 16:50:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="d80000006400810de00f80ecdb4cb9040a4425ef0b000000e87c55a1bc000900b8000699030000000500150007008178a800160040003cc00200001203ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1, 0x0, 0x0, 0x4}, 0x0) 16:50:07 executing program 2: 16:50:07 executing program 3: [ 296.851890] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.4'. 16:50:08 executing program 2: 16:50:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x2}]}}, &(0x7f0000000ac0)=""/141, 0x26, 0x8d, 0x1}, 0x20) 16:50:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) [ 296.931782] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.4'. 16:50:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f0000000200)="ce", 0x1}], 0x3, &(0x7f0000000480)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14}}], 0x30}, 0x0) 16:50:08 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x0}, 0x40) 16:50:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x2}]}}, &(0x7f0000000ac0)=""/141, 0x26, 0x8d, 0x1}, 0x20) 16:50:08 executing program 2: 16:50:08 executing program 5: 16:50:08 executing program 3: 16:50:08 executing program 4: 16:50:08 executing program 2: 16:50:08 executing program 0: 16:50:08 executing program 5: 16:50:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) 16:50:08 executing program 2: 16:50:08 executing program 5: 16:50:08 executing program 3: 16:50:08 executing program 4: 16:50:08 executing program 0: 16:50:08 executing program 2: 16:50:08 executing program 3: 16:50:08 executing program 5: 16:50:08 executing program 4: 16:50:08 executing program 0: 16:50:08 executing program 5: 16:50:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) 16:50:08 executing program 2: 16:50:08 executing program 3: 16:50:08 executing program 4: 16:50:08 executing program 0: 16:50:08 executing program 2: 16:50:08 executing program 5: 16:50:08 executing program 3: 16:50:08 executing program 0: 16:50:08 executing program 4: 16:50:08 executing program 2: 16:50:08 executing program 5: 16:50:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) 16:50:09 executing program 3: 16:50:09 executing program 0: 16:50:09 executing program 4: 16:50:09 executing program 2: 16:50:09 executing program 0: 16:50:09 executing program 5: 16:50:09 executing program 3: 16:50:09 executing program 4: 16:50:09 executing program 2: 16:50:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)={r3}) 16:50:09 executing program 0: 16:50:09 executing program 5: 16:50:09 executing program 3: 16:50:09 executing program 4: 16:50:09 executing program 2: 16:50:09 executing program 0: 16:50:09 executing program 2: 16:50:09 executing program 3: 16:50:09 executing program 0: 16:50:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)={r3}) 16:50:09 executing program 4: 16:50:09 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) 16:50:09 executing program 2: 16:50:09 executing program 3: 16:50:09 executing program 4: 16:50:09 executing program 5: 16:50:09 executing program 0: 16:50:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)={r3}) 16:50:09 executing program 2: 16:50:09 executing program 4: 16:50:09 executing program 3: 16:50:09 executing program 5: 16:50:09 executing program 2: 16:50:09 executing program 0: 16:50:09 executing program 3: 16:50:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)) 16:50:09 executing program 4: 16:50:09 executing program 5: 16:50:09 executing program 3: 16:50:09 executing program 2: 16:50:09 executing program 4: 16:50:09 executing program 3: 16:50:09 executing program 2: 16:50:09 executing program 0: 16:50:10 executing program 5: 16:50:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)) 16:50:10 executing program 3: 16:50:10 executing program 4: 16:50:10 executing program 2: 16:50:10 executing program 0: 16:50:10 executing program 5: 16:50:10 executing program 0: 16:50:10 executing program 2: 16:50:10 executing program 5: 16:50:10 executing program 4: 16:50:10 executing program 3: 16:50:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)) 16:50:10 executing program 3: 16:50:10 executing program 0: 16:50:10 executing program 5: 16:50:10 executing program 2: 16:50:10 executing program 4: 16:50:10 executing program 3: 16:50:10 executing program 0: 16:50:10 executing program 4: 16:50:10 executing program 5: 16:50:10 executing program 2: 16:50:10 executing program 3: 16:50:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:10 executing program 0: 16:50:10 executing program 4: 16:50:10 executing program 2: 16:50:10 executing program 5: 16:50:10 executing program 3: 16:50:10 executing program 0: 16:50:10 executing program 4: 16:50:10 executing program 5: 16:50:10 executing program 3: 16:50:10 executing program 2: 16:50:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:10 executing program 0: 16:50:10 executing program 4: 16:50:11 executing program 5: 16:50:11 executing program 2: 16:50:11 executing program 3: 16:50:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:11 executing program 0: 16:50:11 executing program 5: 16:50:11 executing program 4: 16:50:11 executing program 2: 16:50:11 executing program 3: 16:50:11 executing program 5: 16:50:11 executing program 0: 16:50:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:11 executing program 4: 16:50:11 executing program 2: 16:50:11 executing program 3: 16:50:11 executing program 5: 16:50:11 executing program 0: 16:50:11 executing program 4: 16:50:11 executing program 2: 16:50:11 executing program 3: 16:50:11 executing program 5: 16:50:11 executing program 0: 16:50:11 executing program 4: 16:50:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:11 executing program 5: 16:50:11 executing program 2: 16:50:11 executing program 3: 16:50:11 executing program 0: 16:50:11 executing program 4: 16:50:11 executing program 5: 16:50:11 executing program 4: 16:50:11 executing program 0: 16:50:11 executing program 2: 16:50:11 executing program 3: 16:50:12 executing program 2: 16:50:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:12 executing program 3: 16:50:12 executing program 0: 16:50:12 executing program 5: 16:50:12 executing program 4: 16:50:12 executing program 2: 16:50:12 executing program 3: 16:50:12 executing program 5: 16:50:12 executing program 0: 16:50:12 executing program 4: 16:50:12 executing program 2: 16:50:12 executing program 3: 16:50:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:12 executing program 5: 16:50:12 executing program 4: 16:50:12 executing program 0: 16:50:12 executing program 2: 16:50:12 executing program 3: mremap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ff8000/0x3000)=nil) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa) 16:50:12 executing program 5: r0 = socket$inet_icmp(0x2, 0x2, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 16:50:12 executing program 4: mlock(&(0x7f0000ff1000/0xe000)=nil, 0xe000) mprotect(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 16:50:12 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xc642, 0x0) 16:50:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:12 executing program 2: setresuid(0xee01, 0xee01, 0x0) setreuid(0xffffffffffffffff, 0xee01) 16:50:12 executing program 3: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaab81, &(0x7f0000000540)=[{&(0x7f00000007c0)="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", 0xff, 0x300000000000000}, {&(0x7f00000002c0)}, {&(0x7f0000000480)="4c154758a53b458e41069b751b0b435a8b76c1bfcb6027a7ed6ff19e345181c008b50b90f8a349bcbf479fd52ae0c110355bb48b7730b6b203706e5b6cd7ceda3627f7ce905599671fae94ec21658daf94e0bf3fadd57669436cb49d58243a51ffdbc77bf9391a4c7cf967d36b162b4e24d119ba1fb0fa73be1cca2fcc0da7833d87d89d37f9916975718f425bb2863186c011e301ccbe3c2ed7f407c033a11edcffb50ef0b789fd1024c7af455b", 0xae, 0x3}], 0x808021, &(0x7f0000000700)=ANY=[@ANYBLOB="687567653d6164766973652c73697a653d393030573033352c687567653d6164766973652c73697a653d782c73697a653d656b32366d7831782c686173682c7375626a57757365723da76a5ab05fb1689e215c9235beb1dadd0d3fa4562383982d5574108ec52c19d7b2ca7c2be3f4bc085eb373cf33e8c507b11e0f3e668513e55b7887e063885f85f09cedd2872240c6c2b3f0c16e51c8c66db5b024a90000000000000000002c6f626a5f757365723d2c00"]) 16:50:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000300)) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000080)={0x3, 0x2, 0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='statm\x00') ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7ff) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f00000002c0)=0x4) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000280)='./file0\x00', 0x1, 0xaaaab81, &(0x7f0000000540)=[{&(0x7f00000007c0)="1a6049d2e72b7f243fc4dc8be05ff2672e3881cac19418e649c94c580ba3ffdf3c605af005f88b1a2be6f46f9bd01c7d2d37a33a6aa1807cfce3fdb9c8e0e4a6673352fb78e586ec5e94f65ec5f89b3b0521500cb2f7e816ee5428d4952d1521041c530711ce394195330f9fc45a2e30d62c9873a3bd56fd3e5cf69ebe75396daaad494d78fd92f64a84cba422bcc80671af02f1a898e85023a18398f023b87ce41cadcb3218463317f47955e8b7f4c70f28a3badc9dff8786f8c9edf6c0005e6142e576183e0ab5283793645a8558e936001629fc59d6e57609ef3c6c11d5177179a6a3e243e8cb6184afc59be94347023b98ff80943bfa036afb14005e1f75bf025e58acca9fc50124223d09373836fa029b0ff8c52665969489af5a7d8b2566547e1c1d824da2771e7533260cdb15c1d7558b9a45daeedc8dc288bd58", 0xff, 0x300000000000000}, {&(0x7f00000002c0), 0x0, 0x21b0}, {&(0x7f0000000480)="4c154758a53b458e41069b751b0b435a8b76c1bfcb6027a7ed6ff19e345181c008b50b90f8a349bcbf479fd52ae0c110355bb48b7730b6b203706e5b6cd7ceda3627f7ce905599671fae94ec21658daf94e0bf3fadd57669436cb49d58243a51ffdbc77bf9391a4c7cf967d36b162b4e24d119ba1fb0fa73be1cca2fcc0da7833d87d89d37f9916975718f425bb2863186c011e301ccbe3c2ed7f407c033a11edcffb50ef0b789fd1024c7af455b", 0xae, 0x3}], 0x808021, &(0x7f0000000700)=ANY=[@ANYBLOB="687567653d6164766973652c73697a653d393030573033352c687567653d6164766973652c73697a653d782c73697a653d656b32366d7831782c686173682c7375626a57757365723da76a5ab05fb1689e215c9235beb1dadd0d3fa4562383982d5574108ec52c19d7b2ca7c2be3f4bc085eb373cf33e8c507b11e0f3e668513e55b7887e063885f85f09cedd2872240c6c2b3f0c16e51c8c66db5b024a90000000000000000002c6f626a5f757365723d2c00"]) read$eventfd(0xffffffffffffffff, &(0x7f0000000380), 0x8) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x2f, 0x1f, 0xb4, 0x4, 0x1, @private0={0xfc, 0x0, [], 0x1}, @ipv4={[], [], @private=0xa010101}, 0x0, 0x20, 0x0, 0xae6a}}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001840)='net/sockstat6\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000640)=ANY=[@ANYBLOB="020000000000000400000000000000afd8a6ef27bc865e2459f2a5b46921adc418f0c82d6e75cd20a1c262a71b0d543224477ea0d3ab63462c47236b68d17722ce75e7de94d9b87f2a57f866e1a6df2d38dc8ae84c16e500a2ba66b9c55195b702adb43b9e007196ff5fa2fc230ec5fccbeff02f6e0cca487c0392e47ea8ab3900"/140]) 16:50:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000040)=0x9, 0x4) 16:50:12 executing program 4: open(&(0x7f0000000340)='./file0\x00', 0x4040, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 301.620798] audit: type=1800 audit(1602953412.692:23): pid=13889 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16269 res=0 16:50:12 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in, 0x80) [ 301.731525] audit: type=1800 audit(1602953412.722:24): pid=13889 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16269 res=0 16:50:12 executing program 4: rt_sigprocmask(0x2, &(0x7f0000000100), &(0x7f0000000140), 0x8) 16:50:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000001800)="3a3337a092eedbf2", 0x8) 16:50:12 executing program 0: setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) unlinkat(0xffffffffffffffff, &(0x7f0000000580)='\x00', 0x200) [ 301.861293] audit: type=1800 audit(1602953412.812:25): pid=13900 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16268 res=0 16:50:13 executing program 4: r0 = socket$inet_icmp(0x2, 0x2, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) [ 301.982963] audit: type=1800 audit(1602953412.812:26): pid=13900 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16268 res=0 16:50:13 executing program 5: setgroups(0x1, &(0x7f0000000040)=[0x0]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 16:50:13 executing program 4: msync(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x9) 16:50:13 executing program 3: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) 16:50:13 executing program 2: mremap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 16:50:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 16:50:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:13 executing program 4: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x2000, 0x1) 16:50:13 executing program 5: r0 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000000)) 16:50:13 executing program 3: timer_create(0x0, &(0x7f0000001040)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000001080)) timer_delete(0x0) 16:50:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000), 0x4) 16:50:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000006200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000006400)) 16:50:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000000680)) 16:50:13 executing program 4: setresuid(0xee00, 0xee00, 0x0) setreuid(0xffffffffffffffff, 0xee01) 16:50:13 executing program 5: shmget(0x1, 0x8000, 0x0, &(0x7f0000ff8000/0x8000)=nil) 16:50:13 executing program 2: mprotect(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3) 16:50:14 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xaaaab81, &(0x7f0000000540)=[{&(0x7f00000007c0)="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", 0xff, 0x300000000000000}, {&(0x7f00000002c0)}, {&(0x7f0000000480)="4c154758a53b458e41069b751b0b435a8b76c1bfcb6027a7ed6ff19e345181c008b50b90f8a349bcbf479fd52ae0c110355bb48b7730b6b203706e5b6cd7ceda3627f7ce905599671fae94ec21658daf94e0bf3fadd57669436cb49d58243a51ffdbc77bf9391a4c7cf967d36b162b4e24d119ba1fb0fa73be1cca2fcc0da7833d87d89d37f9916975718f425bb2863186c011e301ccbe3c2ed7f407c033a11edcffb50ef0b789fd1024c7af455b", 0xae, 0x3}], 0x808021, &(0x7f0000000700)=ANY=[@ANYBLOB="687567653d6164766973652c73697a653d393030573033352c687567653d6164766973652c73697a653d782c73697a653d656b32366d7831782c686173682c7375626a57757365723da76a5ab05fb1689e215c9235beb1dadd0d3fa4562383982d5574108ec52c19d7b2ca7c2be3f4bc085eb373cf33e8c507b11e0f3e668513e55b7887e063885f85f09cedd2872240c6c2b3f0c16e51c8c66db5b024a90000000000000000002c6f626a5f757365723d2c00"]) 16:50:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:14 executing program 3: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:50:14 executing program 5: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000001380)) 16:50:14 executing program 2: r0 = socket$inet_icmp(0x2, 0x2, 0x1) connect$unix(r0, &(0x7f0000001200)=@file={0x1, './file0\x00'}, 0x6e) 16:50:14 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:50:14 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000280)='./file0\x00', 0x1, 0x3, &(0x7f0000000540)=[{&(0x7f00000007c0)="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", 0x13e, 0x300000000000000}, {&(0x7f00000002c0), 0x0, 0x21b0}, {&(0x7f0000000480)="4c154758a53b458e41069b751b0b435a8b76c1bfcb6027a7ed6ff19e345181c008b50b90f8a349bcbf479fd52ae0c110355bb48b7730b6b203706e5b6cd7ceda3627f7ce905599671fae94ec21658daf94e0bf3fadd57669436cb49d58243a51ffdbc77bf9391a4c7cf967d36b162b4e24d119ba1fb0fa73be1cca2fcc0da7833d", 0x81, 0x3}], 0x808021, &(0x7f0000000700)=ANY=[@ANYBLOB="687567653d6164766973652c73697a653d393030573033352c687567653d6164766973652c73697a653d782c73697a653d656b32366d7831782c686173682c7375626a57757365723da76a5ab05fb1689e215c9235beb1dadd0d3fa4562383982d5574108ec52c19d7b2ca7c2be3f4bc085eb373cf33e8c507b11e0f3e668513e55b7887e063885f85f09cedd2872240c6c2b3f0c16e51c8c66db5b024a90000000000000000002c6f626a5f757365723d2c00"]) 16:50:14 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg(r0, &(0x7f0000003fc0)=[{{&(0x7f0000000000)=@nl, 0x80, 0x0}}], 0x1, 0x0, &(0x7f0000004200)={0x0, 0x3938700}) 16:50:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:14 executing program 5: getpgrp(0x0) eventfd(0x0) 16:50:14 executing program 2: pselect6(0x24, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 16:50:14 executing program 3: setresuid(0xee01, 0xee01, 0xee00) r0 = getuid() setresuid(r0, 0xee01, 0x0) 16:50:15 executing program 4: sysinfo(&(0x7f00000001c0)=""/118) 16:50:15 executing program 2: clone(0x10100000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000380)) 16:50:15 executing program 5: clock_gettime(0xbd7584c2dfc30e0f, 0x0) ioctl$CHAR_RAW_ROSET(0xffffffffffffffff, 0x125d, 0x0) 16:50:15 executing program 3: socket$unix(0x1, 0x1, 0x0) clone(0x1000000, &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) 16:50:15 executing program 0: mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 16:50:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:15 executing program 0: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) mlockall(0x1) 16:50:15 executing program 5: pselect6(0x40, &(0x7f0000000000)={0x6}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 16:50:15 executing program 4: r0 = open(&(0x7f0000000340)='./file0\x00', 0x4040, 0x0) getdents64(r0, 0x0, 0x0) 16:50:15 executing program 3: mlock(&(0x7f0000ff1000/0xe000)=nil, 0xe000) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 16:50:15 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file1\x00') 16:50:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) [ 304.159332] audit: type=1800 audit(1602953415.232:27): pid=14040 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16326 res=0 16:50:15 executing program 4: clone(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280), &(0x7f0000000480)="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") 16:50:15 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x3, &(0x7f0000000540)=[{&(0x7f00000007c0)="1a6049d2e72b7f243fc4dc8be05ff2672e3881cac19418e649c94c580ba3ffdf3c605af005f88b1a2be6f46f9bd01c7d2d37a33a6aa1807cfce3fdb9c8e0e4a6673352fb78e586ec5e94f65ec5f89b3b0521500cb2f7e816ee5428d4952d1521041c530711ce394195330f9fc45a2e30d62c9873a3bd56fd3e5cf69ebe75396daaad494d78fd92f64a84cba422bcc80671af02f1a898e85023a18398f023b87ce41cadcb3218463317f47955e8b7f4c70f28a3badc9dff8786f8c9edf6c0005e6142e576183e0ab5283793645a8558e936001629fc59d6e57609ef3c6c11d5177179a6a3e243e8cb6184afc59be94347023b98ff80943bfa036afb14005e1f75bf025e58acca9fc50124223d09373836fa029b0ff8c52665969489af5a7d8b2566547e1c1d824da2771e7533260cdb15c1d7558b9a45daeedc8dc288bd58", 0x13e, 0x300000000000000}, {&(0x7f00000002c0), 0x0, 0x21b0}, {&(0x7f0000000480)="4c154758a53b458e41069b751b0b435a8b76c1bfcb6027a7ed6ff19e345181c008b50b90f8a349bcbf479fd52ae0c110355bb48b7730b6b203706e5b6cd7ceda3627f7ce905599671fae94ec21658daf94e0bf3fadd57669436cb49d58243a51ffdbc77bf9391a4c7cf967d36b162b4e24d119ba1fb0fa73be1cca2fcc0da7833d87d89d37f9916975718f425bb2863186c011e301ccbe3c2ed7f407c033a11edcffb50ef0b789fd1024c7af455b", 0xae, 0x3}], 0x808021, 0x0) 16:50:15 executing program 5: socketpair(0x0, 0xcc10953aedeb69a1, 0x0, &(0x7f0000000040)) 16:50:15 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) sendto(r0, 0x0, 0x0, 0x8000, 0x0, 0x0) [ 304.277304] audit: type=1800 audit(1602953415.262:28): pid=14040 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16326 res=0 16:50:15 executing program 5: getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/205, 0x0) 16:50:15 executing program 3: mlockall(0x1) mremap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ff8000/0x3000)=nil) 16:50:16 executing program 0: timer_create(0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) socket$unix(0x1, 0x0, 0x0) 16:50:16 executing program 2: timerfd_create(0x0, 0x100000) 16:50:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:16 executing program 4: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x48aed54c1fbde350) 16:50:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x44048080, 0x0, 0x44) 16:50:16 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$eventfd(r0, 0x0, 0x0) 16:50:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000006c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@mark={{0x14}}], 0x18}}], 0x1, 0x0) 16:50:16 executing program 5: socket$kcm(0x10, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f000001f0c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002e000511d25a45594f0abaea18aa0300102012400c00020002000034edeec2d40037153e370a00010700", 0x2e}], 0x1}, 0x0) 16:50:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f000001f0c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e0000002e000511d25a45594f0abaea18aa0300102012400c00020002000034edeec2d40037153e370a00010700", 0x2e}], 0x1}, 0x0) 16:50:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 16:50:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r1, r0, 0x2}, 0x10) 16:50:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x200408c4) 16:50:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='cgroup.stat\x00', 0x275a, 0x0) 16:50:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:16 executing program 0: 16:50:16 executing program 3: 16:50:16 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x19, 0x0, 0x0) 16:50:16 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, 0x0}, 0x0) 16:50:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x38, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 16:50:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x5451, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:50:16 executing program 0: 16:50:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:16 executing program 2: 16:50:16 executing program 4: 16:50:16 executing program 0: 16:50:16 executing program 5: 16:50:16 executing program 3: 16:50:16 executing program 2: 16:50:16 executing program 0: 16:50:16 executing program 5: 16:50:16 executing program 4: 16:50:16 executing program 3: 16:50:17 executing program 2: 16:50:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:17 executing program 0: 16:50:17 executing program 4: 16:50:17 executing program 5: 16:50:17 executing program 3: 16:50:17 executing program 2: 16:50:17 executing program 0: 16:50:17 executing program 3: 16:50:17 executing program 4: 16:50:17 executing program 5: 16:50:17 executing program 2: 16:50:17 executing program 5: 16:50:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:17 executing program 0: 16:50:17 executing program 4: 16:50:17 executing program 3: 16:50:17 executing program 5: 16:50:17 executing program 2: 16:50:17 executing program 0: 16:50:17 executing program 4: 16:50:17 executing program 3: 16:50:17 executing program 5: 16:50:17 executing program 2: 16:50:17 executing program 3: 16:50:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:17 executing program 0: 16:50:17 executing program 5: 16:50:17 executing program 2: 16:50:17 executing program 4: 16:50:17 executing program 3: 16:50:17 executing program 4: 16:50:17 executing program 0: 16:50:17 executing program 2: 16:50:17 executing program 5: 16:50:18 executing program 2: 16:50:18 executing program 3: 16:50:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:18 executing program 0: 16:50:18 executing program 4: 16:50:18 executing program 5: 16:50:18 executing program 2: 16:50:18 executing program 3: 16:50:18 executing program 4: 16:50:18 executing program 0: 16:50:18 executing program 5: 16:50:18 executing program 3: 16:50:18 executing program 4: 16:50:18 executing program 0: 16:50:18 executing program 2: 16:50:18 executing program 5: 16:50:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:18 executing program 3: 16:50:18 executing program 5: 16:50:18 executing program 3: 16:50:18 executing program 4: 16:50:18 executing program 0: 16:50:18 executing program 2: 16:50:18 executing program 5: 16:50:18 executing program 3: 16:50:18 executing program 0: 16:50:18 executing program 4: 16:50:18 executing program 5: 16:50:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:18 executing program 4: 16:50:18 executing program 3: 16:50:18 executing program 2: 16:50:18 executing program 0: 16:50:19 executing program 5: 16:50:19 executing program 2: 16:50:19 executing program 4: 16:50:19 executing program 3: 16:50:19 executing program 0: 16:50:19 executing program 5: 16:50:19 executing program 3: 16:50:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:19 executing program 4: 16:50:19 executing program 2: 16:50:19 executing program 0: 16:50:19 executing program 5: 16:50:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000a40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40100}, 0xc, &(0x7f0000000a00)={0x0}}, 0x0) 16:50:19 executing program 3: bpf$MAP_LOOKUP_ELEM(0xf, &(0x7f0000001580)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:50:19 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)={[{@huge_always='huge=always'}, {@gid={'gid', 0x3d, 0xee00}}, {@size={'size', 0x3d, [0x4]}}]}) 16:50:19 executing program 5: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0xc0189436, 0x0) 16:50:19 executing program 0: pipe2(&(0x7f0000006940)={0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0x26, &(0x7f00000001c0)={0x0, 0x1, 0xffffffff7fffffff, 0x0, 0xffffffffffffffff}) 16:50:19 executing program 4: r0 = getpgrp(0x0) ptrace$peeksig(0x4209, r0, 0x0, 0x0) 16:50:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:19 executing program 3: io_setup(0x3ff, &(0x7f0000002180)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) [ 308.493108] tmpfs: Bad value '' for mount option 'size' [ 308.527107] tmpfs: Bad value '' for mount option 'size' 16:50:19 executing program 0: syz_mount_image$romfs(0x0, &(0x7f0000001280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000001940)='./file0\x00', 0x10000, 0x0) 16:50:19 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x60000, 0x0) 16:50:19 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000080)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000020c0)={0x2020}, 0x2020) 16:50:19 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000001040)='projid_map\x00') 16:50:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x1, &(0x7f00000008c0)=@raw=[@call], &(0x7f0000000900)='GPL\x00', 0x0, 0xb1, &(0x7f0000000940)=""/177, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:19 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000780)='tmpfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x2c, 0x31]}}}}]}) 16:50:19 executing program 5: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x40049409, 0x0) 16:50:19 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r0, 0x26, &(0x7f0000002180)={0x0, 0x2}) 16:50:19 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) 16:50:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:20 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:20 executing program 4: pipe2(&(0x7f0000006940)={0xffffffffffffffff}, 0x0) io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000013c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 16:50:20 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:50:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @dev}}, 0x0, 0x0, 0x1fb, 0x0, "4326f4c726f72bdba8a1925adf42d4a9100c0ab2760f99745a0ca55dce9a30df2a3e13f9baace94f29c7954725babd752fe807d9ca32f7f05bacbf24e760f9877edbbe22a4b88094dc297a8c095f6b80"}, 0xd8) 16:50:20 executing program 2: syz_mount_image$romfs(&(0x7f0000000080)='romfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[], [{@appraise_type='appraise_type=imasig'}]}) 16:50:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x5, 0x4) 16:50:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgroup/syz1\x00', 0x200002, 0x0) 16:50:20 executing program 3: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) 16:50:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000), 0x4) 16:50:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:20 executing program 5: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000000)) name_to_handle_at(0xffffffffffffffff, &(0x7f00000063c0)='./file0/file0\x00', 0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) 16:50:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, 0x0}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x68}}, 0x0) 16:50:20 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x410002, 0x0) 16:50:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') 16:50:20 executing program 2: rt_tgsigqueueinfo(0x0, 0xffffffffffffffff, 0xb, &(0x7f0000000080)={0x0, 0x0, 0x3}) 16:50:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:20 executing program 5: io_setup(0x7fff, &(0x7f0000000000)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000002680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, 0x0]) 16:50:20 executing program 4: sysfs$2(0x2, 0x2, &(0x7f0000001100)=""/55) 16:50:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) 16:50:20 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') 16:50:21 executing program 2: sendmsg$sock(0xffffffffffffffff, 0xfffffffffffffffe, 0xafc5841deae8952f) 16:50:21 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00') 16:50:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xeb29c81fe50703af, 0x0) 16:50:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) 16:50:21 executing program 0: syz_open_procfs(0x0, &(0x7f0000002080)='net/ip_tables_matches\x00') 16:50:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 16:50:21 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={[{@huge_never='huge=never'}, {@nr_inodes={'nr_inodes', 0x3d, [0x32]}}, {@size={'size', 0x3d, [0x39, 0x0]}}]}) 16:50:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 16:50:21 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) 16:50:21 executing program 0: io_setup(0x7fff, &(0x7f0000000000)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000002680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 16:50:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00') read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) 16:50:21 executing program 3: getresgid(&(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140)) 16:50:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000740)) 16:50:21 executing program 4: perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x420}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:21 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/vlan/config\x00') 16:50:21 executing program 2: io_setup(0x3, &(0x7f0000000040)) io_setup(0x3, &(0x7f0000001380)) 16:50:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)) 16:50:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000380)="4c99052433b71a99d98c", 0xa) 16:50:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000780)='tmpfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@uid={'uid'}}]}) 16:50:21 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000780)='tmpfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@uid={'uid'}}, {@mpol={'mpol', 0x3d, {'interleave'}}}]}) 16:50:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'gretap0\x00', 0x0}) 16:50:21 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x0, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 16:50:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="ff"], 0x68}}, 0x0) 16:50:21 executing program 5: pipe2(&(0x7f0000006940), 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) [ 310.831749] tmpfs: Bad value 'interleave:' for mount option 'mpol' [ 310.862474] tmpfs: Bad value 'interleave:' for mount option 'mpol' 16:50:22 executing program 2: r0 = getpgid(0x0) wait4(r0, 0x0, 0x0, 0x0) 16:50:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000800)={'syztnl0\x00', 0x0}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='wg2\x00') 16:50:22 executing program 3: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x2008401, &(0x7f0000000640)) 16:50:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000a40)={&(0x7f0000000000), 0xc, &(0x7f0000000a00)={0x0}}, 0x0) 16:50:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000980)) 16:50:22 executing program 5: openat$null(0xffffffffffffff9c, 0x0, 0x40200, 0x0) 16:50:22 executing program 4: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5452, 0x0) 16:50:22 executing program 0: socket$inet6(0xa, 0x3, 0x40) 16:50:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@private0}) 16:50:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0xc, 0x0, &(0x7f0000000040)) 16:50:22 executing program 5: bpf$MAP_LOOKUP_ELEM(0x4, 0x0, 0x0) 16:50:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x2008401, &(0x7f0000000640)={[{@fat=@nfs='nfs'}, {@fat=@flush='flush'}]}) 16:50:22 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000006400)={0x2020}, 0xfffffffffffffdae) 16:50:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:22 executing program 3: openat$hwrng(0xffffffffffffff9c, 0x0, 0x503800, 0x0) 16:50:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20040014, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) 16:50:22 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x86841, 0x0) 16:50:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001b80)=@nat={'nat\x00', 0x1b, 0x5, 0x490, 0x3b0, 0x1a0, 0xffffffff, 0x290, 0x0, 0x4e8, 0x4e8, 0xffffffff, 0x4e8, 0x4e8, 0x5, 0x0, {[{{@ipv6={@private0, @dev, [], [], 'gre0\x00', 'wlan1\x00'}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@rand_addr=' \x01\x00', @ipv6=@ipv4={[], [], @dev}, @gre_key, @icmp_id}}}, {{@ipv6={@dev, @empty, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@empty, @gre_key, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@loopback, @ipv4=@empty, @icmp_id, @icmp_id}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) 16:50:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 16:50:22 executing program 4: r0 = gettid() r1 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r1, r0, 0xfffffffc, &(0x7f0000000080)) 16:50:22 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r0, 0x26, 0x0) 16:50:22 executing program 0: socketpair(0x0, 0x40006, 0x0, 0x0) 16:50:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) 16:50:22 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_LK(r0, &(0x7f00000021c0)={0xf}, 0x28) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x102) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000020c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000002200)=0xe8) write$FUSE_ATTR(r1, &(0x7f0000002240)={0x78, 0x0, r2, {0x401, 0xffffffff, 0x0, {0x4, 0x7ff, 0xffffffffffff0224, 0xffffffff, 0x7, 0xced, 0x8001, 0x6, 0x8, 0x9000, 0xfffffff8, r3, 0xee01, 0x7fffffff, 0x7fff}}}, 0x78) 16:50:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) 16:50:22 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{0x0, 0xea60}}) 16:50:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x1, &(0x7f00000008c0)=@raw=[@call], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x40000100) 16:50:23 executing program 5: pipe2(&(0x7f0000000080), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000002500)='fd/4\x00') 16:50:23 executing program 4: bpf$MAP_LOOKUP_ELEM(0x7, 0x0, 0x0) 16:50:23 executing program 2: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0xc0189436, 0x753000) 16:50:23 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x240, 0x0) 16:50:23 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x40) 16:50:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:23 executing program 5: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:50:23 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)={0x10, 0x453}, 0x10}}, 0x0) 16:50:23 executing program 0: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0xf9ffffff}) 16:50:23 executing program 3: socket$inet6(0xa, 0x0, 0x81) 16:50:23 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 16:50:23 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:50:23 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) 16:50:23 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 16:50:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000300)) 16:50:23 executing program 3: io_setup(0x7fff, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x6, 0x6, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000140)={0x0, 0x989680}, 0x0) 16:50:23 executing program 5: io_setup(0x6, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 16:50:23 executing program 1: socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:23 executing program 0: perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) 16:50:23 executing program 5: pipe2(&(0x7f0000006940)={0xffffffffffffffff}, 0x0) io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0x0, r0, 0x0, 0x0, 0x9}]) 16:50:23 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000000)={0x28}, 0x28) 16:50:23 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 16:50:23 executing program 0: getitimer(0x2, &(0x7f0000000700)) 16:50:23 executing program 2: socketpair(0x10, 0x3, 0xf8, &(0x7f0000006440)) 16:50:24 executing program 1: socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfffffdef}}, 0x0) 16:50:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f0000000640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000006c0)=0x80) write$nbd(r1, 0x0, 0x0) 16:50:24 executing program 0: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x753000) 16:50:24 executing program 2: socketpair(0x76, 0x0, 0x0, &(0x7f0000000000)) 16:50:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, &(0x7f0000000040)) 16:50:24 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r0, 0x0, 0x0) 16:50:24 executing program 3: symlink(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00') utimes(&(0x7f0000000000)='./file0\x00', 0x0) 16:50:24 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000780)='tmpfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x30]}}}}], [{@euid_gt={'euid>'}}]}) 16:50:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x30101) 16:50:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) 16:50:24 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x2b) 16:50:24 executing program 1: socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) 16:50:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={[{@huge_never='huge=never'}, {@nr_inodes={'nr_inodes', 0x3d, [0x32]}}, {@size={'size', 0x3d, [0x65]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x8]}}]}) [ 313.410149] tmpfs: No value for mount option 'euid>00000000000000000000' [ 313.447482] tmpfs: No value for mount option 'euid>00000000000000000000' 16:50:24 executing program 5: sysfs$2(0x2, 0x343aac58, 0x0) 16:50:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@null, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, 0x0}, 0x0) [ 313.569959] tmpfs: Bad value '' for mount option 'nr_blocks' 16:50:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 16:50:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x1b, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x0, 0x0, 0x0, "4326f4c726f72bdba8a1925adf42d4a9100c0ab2760f99745a0ca55dce9a30df2a3e13f9baace94f29c7954725babd752fe807d9ca32f7f05bacbf24e760f9877edbbe22a4b88094dc297a8c095f6b80"}, 0xd8) 16:50:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3}, 0x40) 16:50:24 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) [ 313.661822] tmpfs: Bad value '' for mount option 'nr_blocks' 16:50:24 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000000c0)={0x2020}, 0x2020) 16:50:24 executing program 4: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x541b, 0x0) 16:50:24 executing program 0: socket$inet6(0xa, 0xe, 0x0) 16:50:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) 16:50:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x17, 0x0, &(0x7f0000000140)) 16:50:25 executing program 4: pipe2(&(0x7f0000006940), 0x0) io_setup(0x6, &(0x7f0000000000)) 16:50:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 16:50:25 executing program 0: getitimer(0x0, &(0x7f0000000040)) 16:50:25 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') 16:50:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x68}}, 0x0) 16:50:25 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:25 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x80001, 0x0) 16:50:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, 0x1c) 16:50:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:25 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) 16:50:25 executing program 2: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x0) 16:50:25 executing program 4: sysinfo(&(0x7f0000000080)=""/215) 16:50:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'caif0\x00'}) 16:50:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='wg2\x00') 16:50:25 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') fcntl$lock(r0, 0x24, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 16:50:25 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80) 16:50:25 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000021c0)={0x28, 0xffffffffffffffda, r1}, 0x28) 16:50:25 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x0, 0x0, 0x0, "4326f4c726f72bdba8a1925adf42d4a9100c0ab2760f99745a0ca55dce9a30df2a3e13f9baace94f29c7954725babd752fe807d9ca32f7f05bacbf24e760f9877edbbe22a4b88094dc297a8c095f6b80"}, 0xd8) 16:50:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x24, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x0, 0x0, 0x0, "4326f4c726f72bdba8a1925adf42d4a9100c0ab2760f99745a0ca55dce9a30df2a3e13f9baace94f29c7954725babd752fe807d9ca32f7f05bacbf24e760f9877edbbe22a4b88094dc297a8c095f6b80"}, 0xd8) 16:50:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) 16:50:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:25 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_LK(r0, &(0x7f00000021c0)={0xf}, 0x28) 16:50:25 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f00000012c0)=[{&(0x7f00000001c0)="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", 0xe41, 0x400}], 0x0, 0x0) 16:50:25 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000021c0)={0x28, 0x0, r1}, 0x28) write$FUSE_INIT(r0, &(0x7f0000002140)={0x50, 0x0, r1}, 0x50) 16:50:25 executing program 3: io_setup(0x1, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={[0x2]}, 0x8}) 16:50:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000016c0)) 16:50:26 executing program 4: socketpair(0x10, 0x0, 0x0, &(0x7f0000000000)) 16:50:26 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:26 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000040)={'wg1\x00'}) 16:50:26 executing program 0: bpf$MAP_LOOKUP_ELEM(0x12, 0x0, 0x0) 16:50:26 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@huge_never='huge=never'}, {@size={'size', 0x3d, [0x39, 0x0]}}]}) 16:50:26 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/cgroup\x00') 16:50:26 executing program 0: bpf$MAP_LOOKUP_ELEM(0xc, 0x0, 0x0) 16:50:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x300}, 0x0) 16:50:26 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:26 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xd}, 0x40) 16:50:26 executing program 0: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x7fff, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000001d00)=[&(0x7f0000001040)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000000040)="df640cc4a6fc4834c1", 0x9}]) 16:50:26 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 16:50:26 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) 16:50:26 executing program 2: 16:50:26 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x0, 0x0}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000980)) 16:50:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x2, 0x0, &(0x7f0000000040)) 16:50:26 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x245c0, 0x0) 16:50:26 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:26 executing program 2: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14322}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:26 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:26 executing program 5: sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, 0x0, 0x8c130000) 16:50:26 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) dup2(r0, r1) 16:50:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x0, 0x0, 0x9}, 0x40) 16:50:26 executing program 2: pipe2(&(0x7f0000006380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x818a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10100, 0x6}, r0, 0xa, 0xffffffffffffffff, 0x6) 16:50:26 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/net\x00') 16:50:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@mcast1}, 0x14) 16:50:26 executing program 4: pipe2(0x0, 0x39559650bda3a2ee) 16:50:26 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_LK(r0, &(0x7f00000021c0)={0xf}, 0xffffffffffffff99) 16:50:26 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 16:50:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 16:50:26 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read$FUSE(r0, 0x0, 0x0) 16:50:27 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 16:50:27 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='sched\x00') 16:50:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 16:50:27 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000002140)='/dev/bsg\x00', 0x458001, 0x0) 16:50:27 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:27 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x400, 0x0) 16:50:27 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x218041, 0x0) 16:50:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 16:50:27 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') 16:50:27 executing program 4: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xfff, 0x0) 16:50:27 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) 16:50:27 executing program 3: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0xc020660b, 0x0) 16:50:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f000000a7c0)="985ab1e3", 0x4) 16:50:27 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r0, 0x0, 0x0) 16:50:27 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 16:50:27 executing program 0: socket$inet6(0xa, 0x0, 0xfff) 16:50:27 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:50:27 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x3, &(0x7f00000012c0)=[{&(0x7f00000001c0)="e900e6fd7a8a5bda9de7403e7ee28a272471ddcdd49602218cb72d81f6ff5e71727d6c47e825a8ea4d21d8f41e3b7e6d5625cf0d86aec95fab77ff190cf1e27ca77fdbaa2eb0118cd19dc41af6ab09a30606675aaf33556e474d0d9540aadfed72580ff3ec139300432f22439b2efba32ed10ebabf0ad9842fa82fb41a71dcfa111afb1ee158b7b83b9b1717fa5b17df0db8cd6705233527ab852a6a743542cfcdd511f01b216b54a05c4b5758cc23c1e60643224e96ede15593f6c97a05abaf72b7986d093aa354d60741847810cc72d06c7f66c04b6a87c46bd754569f35268d1a17e2169dacf1d49649bfba8e00f90fffd91a4e2bed19fb77b771f097e6279cd0101b307f59bb8cfbd72a89c059a41cd5935a514a2d97fe06d8921020a98c04bd98478f0cf23ce5bebb696a79dbecd2d4e0c8475fac93f81cd052af452cafe4d64b73f5dadbcb8e1e343190fa9fec79c2b51c3d3dcc8f3cab9154969660a266667e14f004e7d49ce7cde625b31fa3ba109e122a45e5c0dd2e275929e76e218c96496572f909d29a9f8d7688bb8b953a9d6b62b2a81ab124428716c42ef449a22f5882eacbd2a45004c43fe54e0eb626b6dac17dd23d68b183d3c0771818a917e020af0b35dccb301663b90c39d1d3ab47bcb50d4f1634ca77ef6d3ce4d0a370ec9a376d6250d8f14909cd935dbbb5a18f6bbfaaa591c1cebda3b4dad9f122a9ca19781fa35ed2dcdbef3cf07adbe95d8502f771b05001054d701cb0d78991c5d2d567b9227e83f02dce0182ffd76d6d907252904ede365a63ec1678b3e5860c4ad0037a131d77d2ad3780cfe9fac348c806c474f3120e500c0698fa4fac88ec60bf30a6981869777de9103621be8514443453abf325738cc969c4e68325912027588738d32f33e2b5224595a754c4475ba4d0133b58b44a9ab89a686a37331516489913c434eb4ee85c7ec2cdd2fb500a8a08b5403a1af25d9a04eac43c810e36a9c7d410d28097d3c76eee72bc477a259ae0b9e4b90c7360ca7e2ae834e2eea7669d0dc50851d0e28ee9c853c3de5b3d539f5ba389fc5d1bb47e02d62d888ab37f87e016fa311e1915fb80fd9bd729eced670e0d84b465d3a46a419c2a4ea1f5f30c321505270846d1e92c7d4a5afe453995b324a942efc88224a0b8266588847288f03d3fb2cca422a6a579adf586e5651e2f682d18ee8a1f2718b611979458e43644cdaf9f0927368f5953f4c95e7fba107ad4301770500ffa31e0adc242ac8bc35f9e2f0b324733d33dc170f76601ef9fe6e466284fb308d18ac156399b92ce99aaef07e7d37ecb49940756b1f5ca3286d7df537096e03df21423703961ce1f7a0d9c14d701bf44bfb80967f692ac49d40cb9d1afafbe2df0555d9349ddc48b0cd9c2b754ab01d65239b67e6e7f5909184628762d9458f85218bd9d660db4bf3e6a2e48da00225b99cc108c543e6574fc591d7eabb5f1d98c1499a6b2b8499bf89cebd8b5cac98cb0a31370d5965dab005c484ad09ff8b40ecdfc20ba46987da7f803fc9b8bf99516815c6dc7f4f3431c2e81ff0e706f59fd80969b56bf9f5d85c18e3a09f3ddc70fa2f49f6e1c974f56e794ceb4ec7a44e767e2e5ba9b33e77433f85821443e5292fa094e1b52b4ff1c123ed58a6e1e5eac8723477c42360569b3035b39d68633d7bb85859f01a157438dbdfd57f3da17c598418f4312b5fad91fef49cbed80f17313d3a8847d9621ca6d3210a1a16b832a43dd9b881eea3381a73cedb465d203c297a921dba581959f48327702ee639b3ebc71e99384c8f21cdd7a13c515f0d6bb20ebb9ed7098bd747ea4483a389a26455d08929b8be82c490d2c9e157f7d5fc8fed1e021d8522a55dd56f74c159447b799d8f55e7dfcfbb8c5659a1ab22de27c6191db7cf89a37d84a820059b63f7797ecafe4f87a747a243229b31d28856bd9fa1b6ec543ad076c9246429fdd974709accc4240640fa4816cedbcd7fbbe637064b13de3ffd5c99a98dc3b47e9c763f34a206ed69fc53df05952f0a12e91c503253418cd61a75534d2e01c49c4f5ae4c8ecc1c19f8e6d89c103c5c077f296970198d0aedc2cdc574ad4f07b91cfd7b2354c195eb31095a81699d3e43e8d43fc0ecb3d401890e8a1a660e643c676da48e84eee2bc6e741b3f8e50194b81baad30461323de5db74ec9fc30ebaaa552e3ebde90241abc8f12ca11937c4af97c5adf4ec4ff2448d4bc3903dfdb4dd4ac6db425921abee6645f041795aaa24dece7816d174775b7871541e03c922e73aa80fa3afff7e830b7d8a206935c007c12d843a87903235eef71d441b1d5690e02128073a1cd270fdea5a4576bfc0c686a48eb1c1ca2d89e0f1000cab6bd5bcfafcc306d846c847b7d7cc19e9577c6407fdde54fb8e863cae3e26c7259606111878e459ac18bd76dbf2c16c20cea10268b0451402d3b39b1483cbf30dff14981c311d153ff47a621aa42f86c06704bf86e8f752ca2dce8a031256cbf3e27ac624680c6e3333017388e783d1dc1483ac29b455f13098de45ec5b7a8fd8ca80d2598804671d556369457906db945fcd92b97c6f7be8715a2b1de5a80fd21341db57da79dbce94d1d0e7c566475f0934120d86f055e476dbf3f7b03a8368f979806e82ba3f357aacc3daaa3f2bcf401a81f4966a1e6f3ec6881ee2c56474ecd959ba257364c3a158e0c8a387e00dfc754e66eca115253c3a579393483fa4fb712a1b021e1c3127b1fd599c8d66665d16f89b12c2ec14800641eb355c7439eee2e06b717ca9434b163d744071495257689e77d6188600886ce85752bbf5d05abc7a86e95b11d836e9f4955caa8acedb6ec08e534758290e2477bea45dad5a84d5a135b61da969b787caedd217fbfb0e0553d2749a6fbfc0192be8dc34a1d390b0c2f71e7d32c302386ca3662c8e55a9328378f089ad37bc3190359cc3dbcc0fe18d6a6ba1ab8547247ab0b5fc41d3c641cf1f53e935191ebd62b9996bd73da2cfaafc466f3f34103db345abb92f950db1853b41871b7173508838c74a023a89fa7fb023544320a0ea8f894b83de9c399c712f582a6fa4c5f5d63c9c43c5ddc2d9b015422f0a46c11a909d93d4b18a5f104fe88318ff90a8732a6ebdba912f893441a0aac662db931311cf7565c5aa09f6a40dffbbf4397580f52481949c56a8f858bf9fed52a2d2f95ad2a19832a59121431f059b1cec05c0caf5956945f6a48869cd515a1f9ef145ec4f7abe46f4d6e8ed9f040b0927efe4360904994d82012f2ddcb6ce36787d36f51eba486560849319834c228016769d4ce07f692a7d6a315eb48605c991a22e4c3455239432d0cf787661ce7bd953d1379d0781f0244e8c76372bc21c781a82365a4d6b47ebc15ef96f5237afd812662a1eb03b91fa25d01b1d3fa8a470d4dc96013f92de52082ca3fc1faf4cc47acbf865314b65f1ee04f44b9933f8f48696edaba2d392cf11d4d7370598137122c51250d8274dbb03df8ed292c25e6a4d7c5dd4add979d14a1b38e80ab92591a21b21f484d9daa27363b0d981548fa5926649a8bc719288cbe75f3550a5029edd3a9cfe1ae14d2e26bb3c453d21dc449e032a67730bcf930d9d137c803d7eafa54321219bfef835e7c7546f0bbd5e444e1d68867a4dfb94fa9f96f3f54cdeced5558e47cab018b02cff1a02de6e0ac7007b22a98b0a3805ec3abfa1fbde3ec7c619dcf092028e191872052e840b2823511ebf09b5037d0e29a26eeac19b71dc91367b029eef4ed89c845617ec950aa2007f19803b3e813b2ca9490ba6dcd060a2650232c51b6eee4385971f9dcb3483f8f57cae61732f2c43ad244824de4d07b1e95077177a11459ebcd11da644dc23bee60ace1a07bc4b7c990ac069ae33c1cac5a5151eb01403dbb9cb5c3c5dd9c68c31a47d886376144ef48318f3e10945ab7892d5ec725f55628bfc91645afbd3b97dd830d2dc6b9c4e76a3cf6e2cc284b7c861d812042b58d75f3dbe32f31911c2b70296875199023c9bd5542b0ff6d3c53341ea1b16a4948d534f26e147efb1c830383fe00d55b9e1600e1fadfb4a0097cb70c802c0f0dc8e45f8010c1b7d201db25957bed9076501f61109399d3308079717c3a2f2857e2d478f15b90803ef139645254af44fc36bb617923a7cbb714f5d5f88f965bbfb7c7b5dcf11607e828efea96766595e3fbdbc0bf8de099488652082842061977db8b9d4500a41566799e8439de25f65d294982c3355461cee99d8f4cb09abf1d21b87a64a790e2f18ae60c6d4a7fd021c207fa5eb0b791254927496d5b8fe65542933302c5cfce58fec891445b98f41613a39c3022987dc1e98cbceb05810977f6bdd493691cc970ff1159d1fb19be57574004748776894cb2ce4bb977062040c65ed7556a8aab5893a1edbfe6badaf707bec88afdbe3d6ccfc553e53112d2b8c752db53b417a3fe803b232e3c3d2640e69a1b2884e8abb22634ed3f546a70eff2c56652cb687e17125601d92119e97801db44b746287d6e944a1de1fd563b47cb285c8e6004533bbfc71f6ea83217b98262c2d59ad5038349c6bff3b69f46276b1b2ea9003f62cf597243a47979d6fc12017a4a5eb8c2df79e14fad28d21280266eaa008c85ff81d6da3693ff98ad72e8b64935d17496ed17db0a39bf016db55a1b78f43a6300d1b5a1f130848e81aa9014d7b650a9a0497794cf03bbfcac4d02e1b57694705ab8af4a399d8b8145c040876adb2e4d59e51d5962aabcfc59fb12f3f6c7396513f10fcd162340af67642f0e9067937b1f050f1dce4b870bb03020c787dfd0ac7b7803ac496012f8cb979f318fd2368040ef7a0759a44f7ff2b4b6da75ff57b679c7dd975e56b46dfa94b9af1aa802cad5bb6b4675a28a8b62314d35ceb3cbc52499f297ce1be2d3b2d95dcc0a566e14a55db876d39f9ab840df9de1e3d29651a8045e6f5c3ae147159647cc2cc143d370e348cbee7dd3a2d1b9d18af3d5dbdff6b418de33a45d6ccf493c87e8cea7573d1377acd2c52a5b58643a9d933a4cd85cbfdc0271809e54e469901adb05d5d4ab8623beca33379e055d362e5ad75a650f19e8fccead28b159d59684a4ebcbf53f43563f96e9374b9f6778bbeb116c103ee3cc2ac7ad", 0xe41, 0x400}, {&(0x7f0000001440)="ef", 0x1, 0x7da1fcb9}, {&(0x7f00000013c0)='E', 0x1, 0x50f0}], 0x0, 0x0) 16:50:27 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0, 0x0, 0x20}, 0x10) 16:50:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 16:50:27 executing program 2: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:50:27 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x6, 0x0) 16:50:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:27 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000780)='tmpfs\x00', &(0x7f00000007c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={[{@uid={'uid'}}], [{@euid_gt={'euid>'}}]}) 16:50:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') 16:50:28 executing program 0: pipe2(&(0x7f0000006380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x4}) 16:50:28 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='wchan\x00') [ 317.026177] tmpfs: No value for mount option 'euid>00000000000000000000' 16:50:28 executing program 4: r0 = inotify_init1(0x0) r1 = dup2(r0, r0) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, 0x0) 16:50:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) [ 317.067408] tmpfs: No value for mount option 'euid>00000000000000000000' 16:50:28 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x185080, 0x0) 16:50:28 executing program 2: bpf$MAP_LOOKUP_ELEM(0x9, 0x0, 0x0) 16:50:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x5}, 0x40) 16:50:28 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x30]}}, {@size={'size', 0x3d, [0x39, 0x0]}}]}) 16:50:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000480)) 16:50:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) 16:50:28 executing program 0: pipe2(&(0x7f0000006380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000002300)={0x20}, 0x20) write$FUSE_INTERRUPT(r0, &(0x7f0000002100)={0x10}, 0x10) 16:50:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x8, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:28 executing program 3: sysfs$2(0x2, 0x0, &(0x7f0000000000)=""/61) 16:50:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:28 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(0x0) 16:50:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window, @sack_perm, @window, @window], 0x4) 16:50:28 executing program 5: clock_gettime(0x0, &(0x7f0000000280)) 16:50:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000006380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmmsg$unix(r0, &(0x7f0000000580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}], 0x1, 0x0) 16:50:28 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/null\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000700)='cgroup.subtree_control\x00', 0x2, 0x0) 16:50:28 executing program 3: pipe2(&(0x7f0000006380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffffffffffc0}) 16:50:28 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000001900)='/dev/kvm\x00', 0x0, 0x0) 16:50:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:28 executing program 4: pipe2(&(0x7f0000006380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) 16:50:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x11, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x0, 0x0, 0x0, "4326f4c726f72bdba8a1925adf42d4a9100c0ab2760f99745a0ca55dce9a30df2a3e13f9baace94f29c7954725babd752fe807d9ca32f7f05bacbf24e760f9877edbbe22a4b88094dc297a8c095f6b80"}, 0xd8) 16:50:28 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x0, 0x0, &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:50:28 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@huge_never='huge=never'}, {@nr_inodes={'nr_inodes', 0x3d, [0x32]}}, {@size={'size', 0x3d, [0x39, 0x0]}}]}) 16:50:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x130b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:29 executing program 4: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) 16:50:29 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) 16:50:29 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000080)) getresuid(&(0x7f0000000000), 0x0, 0x0) 16:50:29 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = dup2(r0, r0) write$FUSE_LSEEK(r1, 0x0, 0xfffffd46) 16:50:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000300)={'sit0\x00', 0x0}) 16:50:29 executing program 3: pipe2(&(0x7f0000006380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$tun(r0, &(0x7f0000000100)={@val, @void, @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @multicast1, @multicast2}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, {[@nop, @window={0x3, 0x3}]}}}}}, 0x30) 16:50:29 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/softnet_stat\x00') 16:50:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x68}, 0x1, 0x0, 0xf000000}, 0x0) 16:50:29 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/fib_triestat\x00') 16:50:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0xffffffffffffffd5) 16:50:29 executing program 2: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x2, 0x753000) r2 = dup2(r1, r0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, 0x0) 16:50:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 16:50:29 executing program 3: pipe2(&(0x7f0000006940)={0xffffffffffffffff}, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000080)) 16:50:29 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@size={'size', 0x3d, [0x39, 0x0]}}]}) 16:50:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, "ccb792d6d8c8a95c88cd51afa9aef257016f6a9a54ec1a09425370d6892e910144139f9114da07dd0c415b0c9038b8cf7e9dfa586394719e4e474fe9cc98d68cbfbd424443ca5244b4f91195602592a9"}, 0xd8) 16:50:29 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f00000025c0), 0x1000, &(0x7f0000002640)) 16:50:29 executing program 3: execve(&(0x7f0000000280)='\x00', 0x0, 0x0) 16:50:29 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@size={'size', 0x3d, [0x39, 0x0]}}]}) 16:50:29 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000580)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x0) 16:50:29 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r1 = dup2(r0, r0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r2) 16:50:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000002080)='net/ip_tables_matches\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 16:50:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) 16:50:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:29 executing program 2: bpf$MAP_LOOKUP_ELEM(0x17, 0x0, 0x0) 16:50:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:30 executing program 4: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5460, 0x0) 16:50:30 executing program 3: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x4020940d, 0x0) 16:50:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000006c0)) 16:50:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:30 executing program 2: clock_gettime(0x0, &(0x7f0000004880)) 16:50:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) 16:50:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x2, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @private1}}, 0x0, 0x0, 0x0, 0x0, "4326f4c726f72bdba8a1925adf42d4a9100c0ab2760f99745a0ca55dce9a30df2a3e13f9baace94f29c7954725babd752fe807d9ca32f7f05bacbf24e760f9877edbbe22a4b88094dc297a8c095f6b80"}, 0xd8) 16:50:30 executing program 2: add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', 0x0, 0x0, 0x9, 0x0) 16:50:30 executing program 3: inotify_init1(0xf83b4a6943d4c29b) 16:50:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:30 executing program 5: r0 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r0, &(0x7f0000000000)) 16:50:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:31 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000140)="6d527cd53870164a3a0d4b64fb0d7bebad2dce076e7768215970e33adf15173c9e665cff10727f6273ef2aace367c13b8e834788d7da2d60077ebc24a796b221a2f39fd294dc01861206b499138d02ebf3cfc3b11f0e18858568476bac483df9c4d0a61da2d2f9b7c4cb601c0141f209fc9e06d9457920a9a749a23ccd52eb91db50189627774719cf91bd6e63a2b8a3b657c0e438ffc3e275b03ef0f384a0c1f20143b7b87f2e34729b000000805e0ad338423d4200f349c545516c46bb9f104a3816b12950faa20fab5827bc62a8d4cc12c4c8954308a933d63aa66cdb3646a37626de7361b5338c197dd3e6844dafcb4338dce0b79ee41da150eca12fbd36b4873ce8e4747b63e8830ee6c32f254d37792053e2b77cc86279ea843600"/297, 0x3accf8d5) setpgid(r0, 0x0) 16:50:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x40) 16:50:31 executing program 3: syz_mount_image$msdos(&(0x7f00000016c0)='msdos\x00', &(0x7f0000001700)='./file0\x00', 0x0, 0x0, &(0x7f0000001800), 0x0, &(0x7f0000001840)={[{@fat=@dmask={'dmask'}}, {@fat=@errors_continue='errors=continue'}]}) 16:50:31 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000001b80)='NLBL_MGMT\x00') 16:50:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0), 0x0, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) [ 320.342855] FAT-fs (loop3): bogus number of reserved sectors 16:50:31 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1c1440, 0x0) 16:50:31 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_LSEEK(r0, 0x0, 0xfffffffffffffe10) [ 320.386605] FAT-fs (loop3): Can't find a valid FAT filesystem [ 320.516517] FAT-fs (loop3): bogus number of reserved sectors [ 320.522613] FAT-fs (loop3): Can't find a valid FAT filesystem 16:50:31 executing program 5: bpf$MAP_LOOKUP_ELEM(0x6, 0x0, 0x0) 16:50:31 executing program 2: setregid(0x0, 0x0) setregid(0x0, 0xee00) 16:50:31 executing program 3: pipe2(&(0x7f0000006380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x20, 0x0, 0x6000, 0x0, 0xee00, 0xee00}}}, 0x90) 16:50:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:32 executing program 4: clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000140)="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"/297, 0x3accf8d5) setpgid(r0, 0x0) 16:50:32 executing program 2: socketpair(0x1, 0x0, 0x557, &(0x7f0000000000)) 16:50:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00') write$FUSE_LK(r0, 0x0, 0x0) 16:50:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000002580)={0x1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 16:50:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, 0x0, 0x0) 16:50:32 executing program 5: bpf$MAP_LOOKUP_ELEM(0x13, 0x0, 0x0) 16:50:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)={0x0, {{0xa, 0x0, 0x0, @local}}}, 0x90) 16:50:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:32 executing program 2: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x400000) 16:50:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x130b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:33 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x4}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20002c51"], 0x0) 16:50:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x0, 0x0, 0x2, 0x8}, 0x40) 16:50:33 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000003640)={0x2020}, 0x2020) 16:50:33 executing program 2: pipe2(&(0x7f0000006940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x2, 0x400000) 16:50:33 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{0x0}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001240)=[{{&(0x7f0000000640)=@l2tp={0x2, 0x0, @initdev}, 0x80, 0x0}}], 0x1, 0x40002032, 0x0) 16:50:33 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:33 executing program 2: symlink(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 16:50:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:33 executing program 5: 16:50:33 executing program 4: 16:50:33 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:33 executing program 5: 16:50:33 executing program 3: 16:50:33 executing program 2: 16:50:33 executing program 4: 16:50:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:33 executing program 3: 16:50:33 executing program 4: 16:50:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:34 executing program 2: 16:50:34 executing program 5: 16:50:34 executing program 4: 16:50:34 executing program 3: 16:50:34 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:34 executing program 2: 16:50:34 executing program 5: 16:50:34 executing program 3: 16:50:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:34 executing program 4: 16:50:34 executing program 2: 16:50:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:34 executing program 5: 16:50:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 16:50:34 executing program 2: 16:50:34 executing program 4: 16:50:34 executing program 5: 16:50:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:34 executing program 3: 16:50:34 executing program 4: 16:50:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f", 0x17}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:34 executing program 2: 16:50:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) 16:50:34 executing program 5: 16:50:34 executing program 4: 16:50:34 executing program 3: 16:50:34 executing program 5: 16:50:34 executing program 2: 16:50:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) 16:50:34 executing program 3: 16:50:35 executing program 4: 16:50:35 executing program 5: 16:50:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f", 0x17}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:35 executing program 3: 16:50:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) 16:50:35 executing program 2: 16:50:35 executing program 4: 16:50:35 executing program 5: 16:50:35 executing program 4: 16:50:35 executing program 3: 16:50:35 executing program 2: 16:50:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, 0x0, 0x0) 16:50:35 executing program 5: 16:50:35 executing program 2: 16:50:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f", 0x17}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:35 executing program 3: 16:50:35 executing program 5: 16:50:35 executing program 4: 16:50:35 executing program 0: 16:50:35 executing program 2: 16:50:35 executing program 0: 16:50:35 executing program 4: 16:50:35 executing program 5: 16:50:35 executing program 2: 16:50:35 executing program 3: 16:50:35 executing program 3: 16:50:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e00", 0x23}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:36 executing program 0: 16:50:36 executing program 5: 16:50:36 executing program 4: 16:50:36 executing program 2: 16:50:36 executing program 0: 16:50:36 executing program 2: 16:50:36 executing program 4: 16:50:36 executing program 3: 16:50:36 executing program 5: 16:50:36 executing program 0: 16:50:36 executing program 2: 16:50:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e00", 0x23}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:36 executing program 4: 16:50:36 executing program 3: 16:50:36 executing program 5: 16:50:36 executing program 2: 16:50:36 executing program 0: 16:50:36 executing program 3: 16:50:36 executing program 4: 16:50:36 executing program 5: 16:50:36 executing program 2: 16:50:36 executing program 3: 16:50:36 executing program 0: 16:50:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e00", 0x23}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:36 executing program 5: 16:50:36 executing program 4: 16:50:36 executing program 2: 16:50:36 executing program 4: 16:50:36 executing program 5: 16:50:36 executing program 0: 16:50:36 executing program 3: 16:50:37 executing program 5: 16:50:37 executing program 4: 16:50:37 executing program 2: 16:50:37 executing program 0: 16:50:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb", 0x29}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:37 executing program 3: 16:50:37 executing program 5: 16:50:37 executing program 4: 16:50:37 executing program 2: 16:50:37 executing program 3: 16:50:37 executing program 0: 16:50:37 executing program 4: 16:50:37 executing program 5: 16:50:37 executing program 0: 16:50:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb", 0x29}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:37 executing program 2: 16:50:37 executing program 3: 16:50:37 executing program 5: 16:50:37 executing program 4: 16:50:37 executing program 3: 16:50:37 executing program 0: 16:50:37 executing program 2: 16:50:37 executing program 3: 16:50:37 executing program 0: 16:50:37 executing program 5: 16:50:37 executing program 4: 16:50:37 executing program 2: 16:50:37 executing program 0: 16:50:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb", 0x29}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:37 executing program 3: 16:50:37 executing program 5: 16:50:37 executing program 4: 16:50:38 executing program 2: 16:50:38 executing program 3: 16:50:38 executing program 0: 16:50:38 executing program 5: 16:50:38 executing program 4: 16:50:38 executing program 3: 16:50:38 executing program 0: 16:50:38 executing program 2: 16:50:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb120001", 0x2c}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:38 executing program 5: 16:50:38 executing program 4: 16:50:38 executing program 5: 16:50:38 executing program 0: 16:50:38 executing program 3: 16:50:38 executing program 4: 16:50:38 executing program 2: 16:50:38 executing program 4: 16:50:38 executing program 5: 16:50:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb120001", 0x2c}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:38 executing program 4: 16:50:38 executing program 2: 16:50:38 executing program 0: 16:50:38 executing program 0: 16:50:38 executing program 3: 16:50:38 executing program 5: 16:50:38 executing program 4: 16:50:38 executing program 2: 16:50:38 executing program 0: 16:50:38 executing program 3: 16:50:38 executing program 5: 16:50:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb120001", 0x2c}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:39 executing program 2: 16:50:39 executing program 4: 16:50:39 executing program 3: 16:50:39 executing program 0: 16:50:39 executing program 5: 16:50:39 executing program 4: 16:50:39 executing program 2: 16:50:39 executing program 3: 16:50:39 executing program 0: 16:50:39 executing program 5: 16:50:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb12000100", 0x2d}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:39 executing program 4: 16:50:39 executing program 3: 16:50:39 executing program 0: 16:50:39 executing program 2: 16:50:39 executing program 5: 16:50:39 executing program 4: 16:50:39 executing program 3: 16:50:39 executing program 0: 16:50:39 executing program 2: 16:50:39 executing program 5: 16:50:39 executing program 4: 16:50:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb12000100", 0x2d}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:39 executing program 3: 16:50:39 executing program 0: 16:50:39 executing program 5: 16:50:39 executing program 4: 16:50:39 executing program 2: 16:50:39 executing program 3: 16:50:39 executing program 0: 16:50:39 executing program 5: 16:50:39 executing program 4: 16:50:40 executing program 3: 16:50:40 executing program 2: 16:50:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb12000100", 0x2d}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:40 executing program 0: 16:50:40 executing program 5: 16:50:40 executing program 4: 16:50:40 executing program 3: 16:50:40 executing program 2: 16:50:40 executing program 5: 16:50:40 executing program 4: 16:50:40 executing program 0: 16:50:40 executing program 2: 16:50:40 executing program 3: 16:50:40 executing program 5: 16:50:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:40 executing program 4: 16:50:40 executing program 2: 16:50:40 executing program 0: 16:50:40 executing program 5: 16:50:40 executing program 3: 16:50:40 executing program 2: 16:50:40 executing program 4: 16:50:40 executing program 0: 16:50:40 executing program 5: 16:50:40 executing program 3: 16:50:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:40 executing program 4: 16:50:40 executing program 0: 16:50:40 executing program 2: 16:50:40 executing program 4: 16:50:40 executing program 3: 16:50:40 executing program 5: 16:50:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:40 executing program 0: 16:50:40 executing program 2: 16:50:41 executing program 4: 16:50:41 executing program 3: 16:50:41 executing program 5: 16:50:41 executing program 0: 16:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:41 executing program 2: 16:50:41 executing program 3: 16:50:41 executing program 4: 16:50:41 executing program 5: 16:50:41 executing program 0: 16:50:41 executing program 4: 16:50:41 executing program 3: 16:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:41 executing program 2: 16:50:41 executing program 5: 16:50:41 executing program 0: 16:50:41 executing program 4: 16:50:41 executing program 3: 16:50:41 executing program 2: 16:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:41 executing program 0: 16:50:41 executing program 5: 16:50:41 executing program 3: 16:50:41 executing program 4: 16:50:41 executing program 0: 16:50:41 executing program 2: 16:50:41 executing program 3: 16:50:41 executing program 5: 16:50:41 executing program 4: 16:50:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:41 executing program 5: 16:50:41 executing program 2: 16:50:41 executing program 0: 16:50:42 executing program 3: 16:50:42 executing program 4: 16:50:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:42 executing program 2: 16:50:42 executing program 5: 16:50:42 executing program 0: 16:50:42 executing program 3: 16:50:42 executing program 4: 16:50:42 executing program 5: 16:50:42 executing program 2: 16:50:42 executing program 4: 16:50:42 executing program 0: 16:50:42 executing program 3: 16:50:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:42 executing program 5: 16:50:42 executing program 2: 16:50:42 executing program 4: 16:50:42 executing program 3: 16:50:42 executing program 0: 16:50:42 executing program 5: 16:50:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:42 executing program 2: 16:50:42 executing program 3: 16:50:42 executing program 4: 16:50:42 executing program 0: 16:50:42 executing program 5: 16:50:42 executing program 3: 16:50:42 executing program 4: 16:50:42 executing program 0: 16:50:43 executing program 3: 16:50:43 executing program 2: 16:50:43 executing program 5: 16:50:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:43 executing program 0: 16:50:43 executing program 4: 16:50:43 executing program 5: 16:50:43 executing program 3: 16:50:43 executing program 2: 16:50:43 executing program 0: 16:50:43 executing program 4: 16:50:43 executing program 3: 16:50:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:43 executing program 5: 16:50:43 executing program 2: 16:50:43 executing program 3: 16:50:43 executing program 0: 16:50:43 executing program 4: 16:50:43 executing program 5: 16:50:43 executing program 2: 16:50:43 executing program 3: 16:50:43 executing program 0: 16:50:43 executing program 4: 16:50:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:43 executing program 2: 16:50:43 executing program 5: 16:50:43 executing program 3: 16:50:43 executing program 4: 16:50:43 executing program 0: 16:50:43 executing program 5: 16:50:43 executing program 3: 16:50:43 executing program 2: 16:50:43 executing program 0: 16:50:43 executing program 4: 16:50:43 executing program 3: 16:50:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:43 executing program 5: 16:50:44 executing program 2: 16:50:44 executing program 0: 16:50:44 executing program 4: 16:50:44 executing program 5: 16:50:44 executing program 3: 16:50:44 executing program 2: 16:50:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5451, 0xb) 16:50:44 executing program 5: socketpair(0x2, 0x2, 0x0, &(0x7f00000001c0)) 16:50:44 executing program 4: sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) munlockall() 16:50:44 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7, 0x1b, 0x6}, 0x7) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') write$P9_RSTAT(r0, &(0x7f0000000200)={0x62, 0x7d, 0x1, {0x0, 0x5b, 0xfd8, 0x101, {0x0, 0x1, 0x7}, 0x20300000, 0x1f7, 0x9291e4e, 0x6, 0xd, 'NLBL_CALIPSO\x00', 0xd, 'NLBL_CALIPSO\x00', 0x9, '\'-(!\'(%\\\\', 0x5, ']*=@#'}}, 0x62) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0x4, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x44085}, 0x4000000) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x5450, 0x0) 16:50:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='limits\x00') read$FUSE(r0, 0x0, 0x0) 16:50:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xd0}, 0x1, 0x0, 0x2}, 0x0) 16:50:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000140)=@abs={0x1, 0x2}, 0x6e, 0x0, 0x0, &(0x7f0000002d00)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000014"], 0x30}], 0x1, 0x0) 16:50:44 executing program 4: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @dev}, 0x8) 16:50:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000140)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="1400000071"], 0x0) 16:50:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') write$FUSE_INIT(r0, &(0x7f0000000080)={0x50}, 0x7) 16:50:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0, 0x36}}, {{&(0x7f0000000000)=@phonet, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/19}, {&(0x7f0000000100)=""/157}, {&(0x7f0000000bc0)=""/4096}, {&(0x7f0000001bc0)=""/4096}, {&(0x7f00000001c0)=""/82}, {&(0x7f0000000240)=""/39}], 0x0, &(0x7f0000000300)=""/33}}, {{&(0x7f0000000780)=@generic, 0x0, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/242}, {&(0x7f00000004c0)=""/54}, {&(0x7f0000000500)=""/175}, {&(0x7f00000005c0)=""/132}]}}], 0x1, 0x0, 0x0) 16:50:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x12060) 16:50:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) getpid() r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000003940)={&(0x7f0000000040)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 16:50:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x4000000, 0x300, 0x0}, 0x0) 16:50:44 executing program 4: pipe2(&(0x7f0000000080), 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') 16:50:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002800)={0x0, 0x0, 0x0}, 0x81e1) 16:50:44 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5450, 0xb) 16:50:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:44 executing program 0: perf_event_open(&(0x7f0000000200)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:44 executing program 3: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000001500), 0x0) 16:50:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)) sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}, 0x0) 16:50:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') read$FUSE(r0, 0x0, 0x0) 16:50:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read$FUSE(r0, 0x0, 0x0) 16:50:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/225, 0xe1}], 0x1}, 0x0) 16:50:45 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x8}, 0x0, 0x0) 16:50:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 16:50:45 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000800)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002840)={0x2020}, 0x2020) 16:50:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x9}, 0x0) 16:50:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x30}, 0x0) 16:50:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/exec\x00') read$FUSE(r0, 0x0, 0x0) 16:50:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xd0}, 0x1, 0x0, 0xb8}, 0x0) 16:50:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) fremovexattr(r0, &(0x7f0000002080)=@known='system.sockprotoname\x00') 16:50:45 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 16:50:45 executing program 0: perf_event_open(&(0x7f0000002b40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1820}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:50:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x7, 0x2}, 0x10}}, 0x0) 16:50:46 executing program 2: sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000004c00)={0x0, 0x0, 0x0}, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x70, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}]}, 0xfffffdef}}, 0x0) 16:50:46 executing program 4: r0 = gettid() rt_sigqueueinfo(r0, 0x17, &(0x7f0000000200)) 16:50:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002d00)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000014"], 0x30}], 0x1, 0x0) 16:50:46 executing program 0: r0 = socket(0x2, 0xa, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) 16:50:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:46 executing program 0: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0x4, &(0x7f0000000000)={@empty=0x1000000, @loopback}, 0x8) 16:50:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400300, 0x500, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:50:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x40049409, 0xb) 16:50:46 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000026c0)={0x2020}, 0xfffffffffffffe82) 16:50:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:46 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='nr_blocks=p']) [ 335.405340] Bluetooth: hci0: command 0x0406 tx timeout [ 335.410870] Bluetooth: hci1: command 0x0406 tx timeout [ 335.438614] Bluetooth: hci2: command 0x0406 tx timeout 16:50:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') write$FUSE_INIT(r0, &(0x7f0000000080)={0x50}, 0x50) [ 335.474046] Bluetooth: hci5: command 0x0406 tx timeout [ 335.524227] Bluetooth: hci3: command 0x0406 tx timeout [ 335.563518] Bluetooth: hci4: command 0x0406 tx timeout 16:50:47 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x400300, 0x300, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:50:47 executing program 4: pselect6(0x1c, &(0x7f0000000240), 0x0, &(0x7f00000002c0), &(0x7f0000000040), 0x0) 16:50:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[], 0xd0}, 0x300}, 0x0) 16:50:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000040)="2fdb98e1f9bb77f7fc61607a92d71077f0c171c972d8aed1fd5f106defb54abeb6258291c64132982ad916fa441d1941405a6c53cc85cb501cf1e30518df4a182d69006b5276482fff65ce067b4df0c6769d331ec08f9fb1d9ebed6208ec6465a0f759c0ecd0e18a4c1890ec728b17049aead708ede67ef7f1c971d2f9a8c43304da25ef5a1379b9687b473b52869fdfdef64b49f3b5182868ed541b6c02f2b61d0e391f11161fbd29308e25ec1dee31904d3858e47542071950273ed59c4d128deafebc3a0e53a6d78fe658a77c9635bfba31d172c470e67f272b099a28ce98f4a451816a6ef5eafe680e2b8a6837369e0e6e44bef563bedcbc29f7300f11c171aadb57f0852c28066f2f01dbde6861c982da3b0bdccd28ed2d343fa3436a4f4742efbf79c0334a18aea8f77b450725eb4a75dcce93a2e6041a9d9902915bf301dd334d3e61be7629d9606b13befb446c3c54e3cd6ebc1f7c8cd5433edb369f3d80c85f1d148b473b5a9e49fd76d15ab0c09ee9067ecfb7ed3003c94ab44d36b05ba088d3ff152b25963c1d99d0525bd741c94c2f5a61b3b00e8cc73a45ba27646633f9c3deec0218a3489ccbb3db6d949cd9f4f573756811372a36d7cdd2794965985e41f8a8bb42e57397d33d28f9d96a50600d44a1bf0e65a29cadee8a389301b41b74522e69370bff21e105cf3e342ae2384556bf41e783879399000165e880cf1bf5acb4df01d6adc95572f7c076ee27d426eb706780f44ce16a9fe7bbe2ec0064d5d8b3ee3290ec9e20d46f960941ebb672383d0cfbd9015563e440ca415ed3010e7ff24a8129bc3123ef3ec2225786c489585646a4c788f40a30712b20051e4e9e4566b980dc06681b4e522661af493b38cce589a74bc88eff4835877f3352642b3917f991032a48e663f68d901daf6d0e9f50311d089c55fce3e980c5d8ac1bc2778960187e1407142b0b30c49884f388638fc6ed0505518930197b64ee5cc5c4d7fdc281a2239cc2eed16d63216d8545c0ef9a84b4b76c4097702cd4ff5aab7386fe093b55a1f4224dcd682ede4ba7d18d7b97568b266b23d4bcec4d6e4af34f6513e87175a974b0883291b321d9b39138b3ce2f28158365a28584aa75ab61e27a9247f7674df45d01d4a77613bd722946be33165d9a87c6ee6d643a5ac3562567223b740a048bbd9b1bdfd8b0a291f7723ecf07ab21ec4135b1af6cfdae774ab5805cb5d4c964d373913aaefa402a2b6b6d54e6b41caaab859e9969506ec3fb6b16fd374f4343d4066d20d1f50f20f7cd1f1b142f9d2cda4257f76bc36aedcecc15790b7e74af13f82855bc1abb7a8a7e9606eceec253e34bca49b08df7a20714abca208c4f03c75a8bca3c02d86344938feaf2856b6e510f2482c804aa41855aeb1530c0d2513c92f2476e9d4b8905d43aae18c71cdb39dd7432ce61d80f85bd90933b9f28f21fff41518826623f67c4ce251f9cab804183017cf64b801aac3af3f5b3a3c0e8c08e9c5eeffbd5b8a6833aa0ad9904fae2e83968a92a2f32c558aff63e157e7b8c952da28e1c9209ace4a909bffc9e9d8cbe00045fa8cc983dac513fa5b474765f38f5289e94d2d563ba1d015102b53304ba2f7326ae5f1603df5a9fe5d3533c7f1b1ba7db5507e1fb387712d639a5a72814d0ae7ea5f71d9fe918a045d060c01c1804794ef188f4452412ba4194727fdf8424485bdb685abff13817e3f356dda135712bf8fac82f6eed9d5216e91a4e4cfde20bfd8e66049c5b8d20ee1cce52d2489cb59f7871b8e0d58c081dcd15cf342612b7201ab90e008f35522d2dcf3106450d38cb5355607215837e9841f0b223387aa63fe4ec2717648650c843386d6e13f0659e64d1c5da9bd478aa6b0f007f30ba705e49a6493fa48c75f64e8e2747b0506747f4d200bf40f006816581a24f49827a10d810e16fc0cd1b7e68704e25bf50b426395b5dd1f07a8167ba38d919e4bca09d4af6b44ff50114699ff61334d862a687e420895cc21270fc7f5a1a2aec7f55019eac2d481e73ec1cdbc5624343f3a95f2137ee90deb91f4c66bda2f5cdc87177fd69d2a9c681c88e0bf845f271bed2439b0594c52d451ecbff9d02633fcfdb7c67bec39b85ebd5a2592cee55b91db4000dae5ed2bc77a1508b48a8942a3f07790a653f84f64f9886917c29c75c7ccfd1db95448d97962141f080b27dd08fbec5c3f55d751de0a40ae845b80dae02b7a9184830bba64f78d533b28a7c9395b96a48a65620c6b005387cbd4c937278290eaad2ac1e7953a43d1329c804bbe31fc91f0458bd4fd32ca5a957a0a1919a0aa1731878a63de6ecb72ae8b1d2273c47ffa6530798c5e62e2428a3f867b543ab9c73029c378996afae6d9ad9fb6d410bd0b616e5e10cb850857bfbe6b0578f0e7294a85911f22732e8ba795221434853522bba749be11d5ed4c0dd1cdaebf5670549d2cc8dc7c7d2ca433efcff22e5e581a2b1087320cc2af11f3c1c1d7fe7aa308348bafb1397c20f4701550226689c59f82b4e48ea5dbc72b14c65c198a38ef901feab6497b0912df8105cadeca5d7aa3a365535c5ae791497ce21e8eefc88b98df3634a1270f68d243691b5efb90046101ce58c48c73d94a38684d319493531db00872cacceced24e4bf172a62a9843c8b8d33b53cc81d10c45300e11f4af721f80766e41cd6c6d955c7ad91c38daee8d9a30dc2d8dae30f09857c5c38ddaacd06c2ea36d3d909a332823292226a1f542bc4241c4fe8dfd3c94e18a4bd58800a3b6d526d11239b5071e4a3032d2a0e783751719de0da69b58099e1272f86e8cad888b65156285190c9af600978c93b1fcfd21c28edc3072c15773d561c86dc9a22b0eca8590c9aa4b3a67099dd4e849ddb091d86fffb49dd5aa4498f6d0c7be90e6bb2d010aa9232f5342338a0a1a8b63d4a871e55f3f9c253d03ce6cbee873b0cffb827ae47a79b19a3161b7ca78f077518ee836e81350ba138c4bd3a3b90df56eefa103ea18c9dd4c1aae1221c240971b857d7b4555604f77134eef75fb74d90c466bd2740d7152bfc2019dd0ba72677cf5944ee6d754b34e6928dbd4e1f237be55d72ca662e2e27b15eb5a7cf72252278cf45472760c577fbb95a14c354cc8efdabc95693ba02705989d6d6b9fa704fb7425f9fdb7e30da8c0dcca3c731300fb1c5400cbc5d1840adbc64eb9f715e0b521514c4486adbc0402ac44422806b49835ab583e8b9d0c9a52e0166d9923e0880c1a82d61645a532eabe98ac477cf136c28400a2e76e1627cb88e14922f27805829c4a5fdf6a014c2d2d28f110645d2f617039b82a83db223d26b352408a24b9421b4fa5d599b5cdb8b04961fbfc39314ca180f8f85a510f16b3b370fdb23844b7dafec05dc915430db352a11ac33f42801c2e0d724e71ac25fff3c62036aa2e410b1a4b89a53f74a7b1fd25894866cbc708054474fc8b450458e1db1af20f1c4a9e9f6a3b0668664e2e3490aed323d95339c32345c45848f261bf3a8ffd059b2a2e88163b48e55713aa921dddbe287b69b6f2666b4d3f8781dd14a42b01ad30d849e2aefbb56adbcf9e532966c8810e598e8fdddebad5e02e25d3e6386bc3f6dafaa9e53bc732ee259eb69f6d3cdab6aede2cbc8b1d63ef621d913994caf2094fa192a73d4078b5393d804fd5d07b046b97fecf79eb04f84dc4babca20c627ff1f04c692aebda4ef89fee201ce2b53283c8ac184f21d41cd6558531abd8adca0abba13495cd0496a80c837a2e8d99f371b8e4a8e48d1c577698bd6c2c7e97e7b4667c6da9978b747a92bddb39d106a6b1bcef94c53b3f70d55e7b76150099f5b3fdf018952f101790d7fc9be90f60febd4e89b733185283156050f6d045efa957cf7e1883953c6b97e1d7bbaf69094b07fda396878d08a758b07a4c90453b1d10b79dcabb1f9ba9b05cb1f59762bf030804ef4590de307fc72a1b4b4bb8f00e03ad0005e935399175cf710932005a9db26f63e58663cdca8b9309554771384fdba8dce4a099c524cb2d5a044c94c60e5e4f6c5778c14b537b88f77865b6869c56b7dc857c36f006a49107e2c257a4972a4a2ed70736862d2f0f0d8844fc6ac24c069ec25df454bfdb6f02ccae9d0e6f4f0a5e88a2acf5d01e8a55a66ca7931b8fbb18c412e5d949859f89ced18aadf958ed1ea6f184bac99b2de4fe665e8a49c20061c52e7b09f7211fc076724e32e59733f6e973e73f26cb4347f94d215418d8bc0ee780485c603667026bba0f886fc685dcf066f441616a8aa8f7f25a984b5721482c3cc601af5956d60394f610032515fc11c746649f029238cbe7a67e09a2a76e2a4cf9457eaefbbbca1e6f924347c6d046ca417e2bf3350a0106379b85cc3b859f2e6cbbe0741eb0e7146feca205ce0e4831e0204701e0d18605fac59e5740fe680ce29d1bf2cfb15e40e6c4e02ae595ba3f52161e2c78773f4e854d7f92d4306a9f3924abcbe5af7ac51eb218a179c32ae0c1e4b6dc6ca89697a1a65e10e1b19bc91a622f0e9ed92b77e8acfeb38e8b92af16dd260e3f5b2cda33099fe9a4564992cbd3b3698a4e00e01c910e116e18b1e70298e04da6506c4e1f193ca138678cb6777de8324fbe7687e615c5d1bd64f3749ca0d2f8f4d42ee952f73dd542f38688f269bcf42765e2c9f801490747b50e687b37d70ed4ccec032eebc401162e9241d75ef477fe2d22db48a43c572b5ea2439f7c5adffef28b100d18e912c5df54dc06ac150dcaf0b96a1082a2826fd20c2c36141391ef6b402c4f8cfc5aa399ca67cd89d1a4b2d568e9c4fdcda347858e473d6264460e1afd1630f5c78e2bea7ef079e48cee9d81a93fa82300eef5bab6cd6c04b03ed53bf6ecfd6e8ec17e5e64c3a6e5b0e43771f52b5daf04ad7d382a5d146eddb706163ee2fe8402b68f1408c8a01d82b815221d837fcb34e9177c5e7f19f802c3761292fc4adede14b03176a63bc1734f5073ff095c8f6946ffc00a38ab489b7288f52b1e1a02a581e98176d84de6257182c2a6b9964b4f2af4e9e40b43bc04ead826cb405341c349690ce389717358f6cf4b3e3b351382f7f7ffa17980fd2938bff87b432f617df86612deeb9fffb2c2e169ad9b987dde6fefb545481d68179fb5c2e213025cd9c4cb9c0ed32ee66d6a67f200363c52b21256b56110cb6d8b63dc7ebd0f67ce9f741271d2888cbb106001d8386ca9743c8e5e72b4c06ea5d7c1f89e88e1db2def3b7495e923884d79cfefbc4f65d99f735dcfc68f44e4ede690b5bd76eff0fc0745ace6450dfb2f61ad68645725a6deafe74b49535bdfbe49fa305570a3d1", 0xec1, 0x0, 0x0, 0x0) 16:50:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={0x0, 0x34}}, 0x0) 16:50:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:47 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) fallocate(r0, 0x51, 0x0, 0x7) 16:50:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000240)=ANY=[@ANYBLOB="020507000700000000000000ffdbdf2505001a"], 0x38}}, 0x0) 16:50:47 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) creat(&(0x7f0000000100)='./bus\x00', 0x0) 16:50:47 executing program 0: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 336.227272] audit: type=1804 audit(1602953447.302:29): pid=15881 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir991923380/syzkaller.2XT9KI/659/bus" dev="sda1" ino=16562 res=1 16:50:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') read$FUSE(r0, 0x0, 0x0) [ 336.334788] audit: type=1804 audit(1602953447.372:30): pid=15886 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir991923380/syzkaller.2XT9KI/659/bus" dev="sda1" ino=16562 res=1 16:50:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x42000, 0x0) r1 = socket(0x3, 0xb, 0x7) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x8c, r2, 0x8, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MESH_CONFIG={0x54, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_FORWARDING={0x5, 0x13, 0x1}, @NL80211_MESHCONF_HWMP_ROOT_INTERVAL={0x6}, @NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffa7}, @NL80211_MESHCONF_HWMP_PATH_TO_ROOT_TIMEOUT={0x8, 0x17, 0x91}, @NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0xe371}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5, 0x1d, 0x1}, @NL80211_MESHCONF_HWMP_NET_DIAM_TRVS_TIME={0x6, 0xd, 0x1}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0x8000}, @NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x67}]}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MESH_CONFIG={0x1c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x6b}, @NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0xf77}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x88c0}, 0x10000800) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) 16:50:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x34000, 0x0, 0x0, 0x0) 16:50:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) 16:50:47 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, 0x0) [ 336.421157] audit: type=1804 audit(1602953447.402:31): pid=15886 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir991923380/syzkaller.2XT9KI/659/bus" dev="sda1" ino=16562 res=1 16:50:47 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0xc, &(0x7f0000000000)={@empty, @loopback}, 0x8) 16:50:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='coredump_filter\x00') write$FUSE_INIT(r0, &(0x7f0000000080)={0x2b}, 0x50) 16:50:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 336.547731] audit: type=1804 audit(1602953447.452:32): pid=15893 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir991923380/syzkaller.2XT9KI/659/bus" dev="sda1" ino=16562 res=1 16:50:47 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) creat(0x0, 0x0) dup2(r0, r1) 16:50:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:47 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:47 executing program 5: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x3) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x65) 16:50:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) accept4$alg(r0, 0x4, 0x0, 0x0) 16:50:47 executing program 0: 16:50:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x8}, &(0x7f0000000300)={0x0, 0x989680}, 0x0) 16:50:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000007700)={0x0, 0x0, &(0x7f0000007640)=[{&(0x7f0000006440)=""/48, 0x30}], 0x1}, 0x0) 16:50:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x2800000000000000, 0x0, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:50:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0xb, &(0x7f0000000000)={@empty, @loopback}, 0x8) 16:50:48 executing program 4: fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_open_procfs(0x0, &(0x7f0000002680)='pagemap\x00') read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) 16:50:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:48 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_mcast\x00') syz_open_procfs(0x0, 0x0) mmap$usbmon(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x50, 0xffffffffffffffff, 0x9) 16:50:48 executing program 5: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) semop(0x0, &(0x7f0000000000)=[{}], 0x1) 16:50:48 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3e8}, 0x0) 16:50:48 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={0x0}}, 0x0) 16:50:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:48 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_mcast\x00') r1 = gettid() syz_open_procfs(r1, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x5}, 0x0, 0x40, 0xffffffffffffffff, 0x0) 16:50:48 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000004280)='/proc/zoneinfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:50:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 16:50:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x8}, 0x0, 0x0) 16:50:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') read$FUSE(r0, 0x0, 0x0) 16:50:48 executing program 0: setuid(0xee01) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000800)="1d", 0x1}], 0x0, 0x0) 16:50:48 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_mcast\x00') r1 = gettid() syz_open_procfs(r1, 0x0) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x5}, 0x0, 0x40, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x50, 0xffffffffffffffff, 0x9) 16:50:48 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000001d80)='/dev/nvram\x00', 0x0, 0x0) pselect6(0x1c, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x8}, &(0x7f0000000040), 0x0) 16:50:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') read$FUSE(r0, 0x0, 0x0) 16:50:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14}, 0x14}, 0x8}, 0x0) 16:50:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) 16:50:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes)\x00'}, 0x58) 16:50:48 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0x4, &(0x7f0000000000)={@empty, @loopback}, 0x8) 16:50:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xf0ff7f}}, 0x0) 16:50:49 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x40012002) 16:50:49 executing program 0: setuid(0xee01) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000003f40), 0x4924924924924e9, 0xc0) 16:50:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') open(&(0x7f0000000100)='./file0\x00', 0x1c3142, 0x0) 16:50:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:49 executing program 3: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x6, 0x0) 16:50:49 executing program 4: setuid(0xee01) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) 16:50:49 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 16:50:49 executing program 4: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0x12, &(0x7f0000000000)={@empty, @loopback}, 0x8) [ 338.495934] overlayfs: upper fs does not support tmpfile. [ 338.521913] overlayfs: upper fs does not support xattr, falling back to index=off and metacopy=off. 16:50:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 338.563604] overlayfs: failed to resolve 'bus': -2 [ 338.624859] overlayfs: './file0' not a directory 16:50:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0xb) 16:50:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:49 executing program 3: madvise(&(0x7f00003ff000/0xc00000)=nil, 0xc00000, 0xe) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x3) 16:50:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_names\x00') read$FUSE(r0, 0x0, 0x0) 16:50:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') open(&(0x7f0000000100)='./file0\x00', 0x1c3142, 0x0) 16:50:50 executing program 4: r0 = memfd_create(&(0x7f0000000080)='\x94\x1a\x05\xaf\x1b\xde\x83\xd0\xbai\x97\xe50\xe9e#\xa7\x94\x98\xa9\xd7\xdc\x9e\xebV=^\x9b\x8f\x04\xee\xac+\xf3\xb0\x03\xa1\xcd\xda\f\x1f\xbf\xf9\x89\x19\xc0~\x85Rg\xae\xb9\xa8\r\x94\xde*\x1eD\x11%\xa5\x7f#\xef\x8c\xe0\x89\xbb@X\xb48\x8e[\xd5o\xc6\xde\xbd\x9e\x7f\xd8\xee\xcb1\x8c\x9dJC\xaeZ\xaf\x80)\x04\x97\xde\xacj\xb7\xbc\'y\x84+\x84s\x12`=;\x82\xe4\x02\x1e\xf7\x94*3E\x05\xcc=\x17\xd2\x98\xe7\xfc\xb99\x85)\xc4/\x8b1:\xe4\'\x9f\x12\x1c\x9c\xdc\xb9\xfa>\xa0\x967c\xab\x16QF\xfbCke35b\x91\xbeY\x03RA\x98\xdc\x95j~\xe4_hj\x90m\xfe\xa7\x90r\x8b\x95\x00\x02\x00\x00W\xdb{L\xb9\xd1\f\xf9\r*\x9c\xe8\xc8W\xa2(\nM\x82\x90!\xafw\xd0Ya\xda\x13J\x94\b\x03R{\xe4u\xc6a\x80_\xce\xd5:\xff\xa3\x12Y\xb1\xf0\xad', 0x0) write$binfmt_script(r0, &(0x7f0000000780)={'#! ', './file0'}, 0xb) 16:50:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='sched\x00') read$FUSE(r0, 0x0, 0x0) 16:50:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000100)=0x80) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) 16:50:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x8}, &(0x7f0000000300), 0x0) 16:50:50 executing program 0: setuid(0xee00) syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') [ 339.386817] overlayfs: upper fs does not support tmpfile. [ 339.414993] overlayfs: upper fs does not support xattr, falling back to index=off and metacopy=off. 16:50:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000003f40), 0x4924924924924e9, 0x44000040) 16:50:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffdef}}, 0x0) [ 339.469299] overlayfs: failed to resolve 'bus': -2 16:50:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x8, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:50:50 executing program 0: r0 = inotify_init() fremovexattr(r0, &(0x7f0000000000)=@random={'trusted.', '\x00'}) 16:50:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x8}, 0x0, 0x0) 16:50:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=ANY=[], 0xf}], 0x1, 0x0) 16:50:50 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x42) 16:50:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) 16:50:50 executing program 5: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000200)={{0x0, 0x5, 0x6, 0x9, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8c2, 0x1000, 0x0, 0x0, 0x0, 0x1}, 0x18, [0x0, 0x0, 0x0]}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) 16:50:50 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x5421, 0xb) 16:50:51 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/msg\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:50:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/135, 0x87}, 0x0) 16:50:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') read$FUSE(r0, 0x0, 0x0) 16:50:51 executing program 5: semctl$SETALL(0x0, 0x0, 0x13, &(0x7f0000000380)) 16:50:51 executing program 2: pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000000000/0x1000)=nil, 0x1000) 16:50:51 executing program 4: setuid(0xee00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000800)={'batadv0\x00'}) 16:50:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000001840)={0x2, 0x10, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1, 0xc0}]}, 0x18}}, 0x0) 16:50:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000002680)='pagemap\x00') read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) 16:50:51 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:51 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x260500) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 16:50:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:50:51 executing program 0: pselect6(0xfffffffffffffcee, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 16:50:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind(r0, &(0x7f0000000300)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80) 16:50:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:50:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:50:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x20}], 0x1, 0x0) 16:50:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:52 executing program 5: ioperm(0x7f, 0x81, 0x1) 16:50:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000180)) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2800000013000100000000000000000008000000010000000400000400000080080027"], 0x28}], 0x1}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(0xffffffffffffffff, 0x8030942b, &(0x7f0000000140)) r3 = gettid() tkill(r3, 0x25) 16:50:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@abs, 0x6e) 16:50:52 executing program 4: add_key$user(&(0x7f0000000440)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) setfsuid(0xee01) 16:50:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x70, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}]}, 0xfffffdef}}, 0x0) [ 341.099802] netlink: 'syz-executor.3': attribute type 39 has an invalid length. 16:50:52 executing program 5: pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) [ 341.149394] netlink: 'syz-executor.3': attribute type 39 has an invalid length. 16:50:52 executing program 4: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0xb, &(0x7f0000000000)={@remote, @loopback}, 0x3) 16:50:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="16"], 0x16}}, 0x0) 16:50:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000001800)={&(0x7f0000000040)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:50:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) 16:50:52 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 16:50:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') read$FUSE(r0, &(0x7f0000000840)={0x2020}, 0x2020) write$FUSE_INIT(r0, 0x0, 0x0) 16:50:52 executing program 4: r0 = socket$inet(0x2, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) bind$alg(r1, &(0x7f0000001400)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(morus640)\x00'}, 0x58) 16:50:52 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='stat\x00') read$FUSE(r0, 0x0, 0x0) 16:50:52 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) 16:50:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, 0x0, 0x0, &(0x7f0000000340)=""/135, 0x87}, 0x0) 16:50:53 executing program 3: syz_open_dev$tty20(0xc, 0x4, 0x1) pselect6(0x40, &(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x8}, &(0x7f0000000300), 0x0) 16:50:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') read$FUSE(r0, 0x0, 0x0) 16:50:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') read$FUSE(r0, 0x0, 0x0) 16:50:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:53 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0x15, &(0x7f0000000000)={@empty, @loopback}, 0x8) 16:50:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x803e, 0x0, 0x0, 0x0) 16:50:53 executing program 4: r0 = socket$inet(0x2, 0x3, 0x6) setsockopt$inet_mreq(r0, 0x0, 0x14, &(0x7f0000000000)={@empty, @loopback}, 0x8) 16:50:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000600)={{0x2, 0x0, @dev}, {0x0, @dev}, 0x0, {0x2, 0x0, @local}}) 16:50:53 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/icmp\x00') read$FUSE(r0, 0x0, 0x0) 16:50:53 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000380)) 16:50:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:53 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') 16:50:53 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap$usbmon(&(0x7f0000d29000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 16:50:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)) sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}, 0x0) 16:50:53 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x2082) 16:50:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x2, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2}]}, 0x20}}, 0x0) 16:50:53 executing program 2: 16:50:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:53 executing program 4: 16:50:53 executing program 3: 16:50:53 executing program 5: 16:50:53 executing program 4: 16:50:53 executing program 0: 16:50:53 executing program 2: 16:50:53 executing program 5: 16:50:53 executing program 3: 16:50:53 executing program 0: 16:50:53 executing program 2: 16:50:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:53 executing program 4: 16:50:53 executing program 5: 16:50:53 executing program 0: 16:50:53 executing program 3: 16:50:53 executing program 4: 16:50:53 executing program 5: 16:50:53 executing program 2: 16:50:54 executing program 5: 16:50:54 executing program 3: 16:50:54 executing program 0: 16:50:54 executing program 4: 16:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:54 executing program 2: 16:50:54 executing program 3: 16:50:54 executing program 5: 16:50:54 executing program 4: 16:50:54 executing program 0: 16:50:54 executing program 2: 16:50:54 executing program 3: 16:50:54 executing program 5: 16:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:54 executing program 4: 16:50:54 executing program 0: 16:50:54 executing program 3: 16:50:54 executing program 2: 16:50:54 executing program 5: 16:50:54 executing program 4: 16:50:54 executing program 0: 16:50:54 executing program 3: 16:50:54 executing program 5: 16:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:54 executing program 4: 16:50:54 executing program 2: 16:50:54 executing program 0: 16:50:54 executing program 3: 16:50:54 executing program 5: 16:50:54 executing program 4: 16:50:54 executing program 0: 16:50:54 executing program 2: 16:50:54 executing program 4: 16:50:54 executing program 3: 16:50:54 executing program 5: 16:50:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:54 executing program 2: 16:50:54 executing program 0: 16:50:54 executing program 5: 16:50:54 executing program 4: 16:50:54 executing program 3: 16:50:55 executing program 2: 16:50:55 executing program 5: 16:50:55 executing program 0: 16:50:55 executing program 5: 16:50:55 executing program 4: 16:50:55 executing program 3: 16:50:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:55 executing program 0: 16:50:55 executing program 5: 16:50:55 executing program 2: 16:50:55 executing program 4: 16:50:55 executing program 5: 16:50:55 executing program 3: 16:50:55 executing program 0: 16:50:55 executing program 2: 16:50:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:55 executing program 4: 16:50:55 executing program 5: 16:50:55 executing program 3: 16:50:55 executing program 0: 16:50:55 executing program 2: 16:50:55 executing program 5: 16:50:55 executing program 4: 16:50:55 executing program 3: 16:50:55 executing program 0: 16:50:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:55 executing program 2: 16:50:55 executing program 5: 16:50:55 executing program 4: 16:50:55 executing program 3: 16:50:55 executing program 0: 16:50:55 executing program 5: 16:50:55 executing program 2: 16:50:55 executing program 4: 16:50:55 executing program 4: 16:50:55 executing program 2: 16:50:55 executing program 3: 16:50:56 executing program 0: 16:50:56 executing program 5: 16:50:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:56 executing program 3: 16:50:56 executing program 4: 16:50:56 executing program 2: 16:50:56 executing program 0: 16:50:56 executing program 5: 16:50:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:56 executing program 0: 16:50:56 executing program 5: 16:50:56 executing program 3: 16:50:56 executing program 4: 16:50:56 executing program 2: 16:50:56 executing program 0: 16:50:56 executing program 5: 16:50:56 executing program 3: 16:50:56 executing program 4: 16:50:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:56 executing program 2: 16:50:56 executing program 5: 16:50:56 executing program 4: 16:50:56 executing program 0: 16:50:56 executing program 2: 16:50:56 executing program 5: 16:50:56 executing program 0: 16:50:56 executing program 3: 16:50:56 executing program 0: 16:50:56 executing program 4: 16:50:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{0x0}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:56 executing program 5: 16:50:56 executing program 2: 16:50:56 executing program 0: 16:50:56 executing program 3: 16:50:56 executing program 4: 16:50:56 executing program 5: 16:50:56 executing program 2: 16:50:56 executing program 0: 16:50:57 executing program 3: 16:50:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:57 executing program 4: 16:50:57 executing program 5: 16:50:57 executing program 0: 16:50:57 executing program 2: 16:50:57 executing program 3: 16:50:57 executing program 4: 16:50:57 executing program 0: 16:50:57 executing program 5: 16:50:57 executing program 2: 16:50:57 executing program 3: 16:50:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:57 executing program 4: 16:50:57 executing program 5: 16:50:57 executing program 0: 16:50:57 executing program 3: 16:50:57 executing program 4: 16:50:57 executing program 5: 16:50:57 executing program 2: 16:50:57 executing program 4: 16:50:57 executing program 0: 16:50:57 executing program 3: 16:50:57 executing program 2: 16:50:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:57 executing program 4: 16:50:57 executing program 3: 16:50:57 executing program 5: 16:50:57 executing program 0: 16:50:57 executing program 2: 16:50:57 executing program 4: 16:50:57 executing program 3: 16:50:57 executing program 5: 16:50:58 executing program 4: 16:50:58 executing program 0: 16:50:58 executing program 3: 16:50:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff02000000000000000000000000002100", 0x2a}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:58 executing program 5: 16:50:58 executing program 2: 16:50:58 executing program 4: 16:50:58 executing program 0: 16:50:58 executing program 3: 16:50:58 executing program 4: 16:50:58 executing program 2: 16:50:58 executing program 3: 16:50:58 executing program 5: 16:50:58 executing program 0: 16:50:58 executing program 4: 16:50:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff02000000000000000000000000002100", 0x2a}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:58 executing program 0: 16:50:58 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000012c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000001340)=[@hopopts_2292={{0x18}}, @dstopts={{0x18}}], 0x30}}], 0x2, 0x0) 16:50:58 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r0, 0x40184152, 0x0) 16:50:58 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @null}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast]}, 0x48) 16:50:58 executing program 4: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000c00)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}, 0x1c, 0x0}}], 0x1, 0x0) 16:50:59 executing program 4: pipe2$9p(&(0x7f0000000080), 0x0) 16:50:59 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x8103) 16:50:59 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) 16:50:59 executing program 0: request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xfffffffffffffffb) 16:50:59 executing program 2: request_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000004a00)={'syz', 0x1}, &(0x7f0000004a40)='kFyring\x00', 0xfffffffffffffffe) 16:50:59 executing program 4: syz_genetlink_get_family_id$gtp(&(0x7f0000004b00)='gtp\x00') 16:50:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff02000000000000000000000000002100", 0x2a}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:59 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/route\x00') 16:50:59 executing program 3: r0 = socket(0x2b, 0x1, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 16:50:59 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000340), 0x4) 16:50:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, 0x0, &(0x7f0000000c00)) 16:50:59 executing program 2: connect$netrom(0xffffffffffffffff, 0x0, 0x0) 16:50:59 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 16:50:59 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 16:50:59 executing program 3: r0 = socket(0x25, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:50:59 executing program 2: waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x40800002, 0x0) 16:50:59 executing program 4: sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) 16:50:59 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001740)={0x0, 0x0, 0x28}, 0x10) 16:50:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2", 0x3f}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:50:59 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x3, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) 16:50:59 executing program 4: r0 = socket(0x10, 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x101, 0x0, 0x0) [ 348.776872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16598 comm=syz-executor.5 16:50:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000046c0)=[{{&(0x7f0000000080)={0xa, 0xe23, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="5ae0decced7980675bb7ffa5ff31e18f122fb5952e1216566fc2c937698133941c15a43c65898eeed063786ef09b2ace060c998105f11063e430acdf6b67a64ed3baa2136b708343edfaf274acbabfc6dfa15450be44b1a05e186c", 0x5b}, {&(0x7f0000000140)="0ee815d4e2c20d47f115f16afd11ce4bfde1d207d77026f960a789b3489645cb29fee1445ba4c8c8861b3f37030600b4cd83bd7d9200d70d13ffe0279838cf2d8637cb1a6db97d9f288f846845abcf2a9ee014bed0c8a2557165d1707c5b4231cbc5b5dececbcbcabdc791fe2dea69053323928e", 0x74}, {&(0x7f0000000040)="45fc14bb83f5a3b2c71666d5030cba317e", 0x11}], 0x3}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="39feafa410c965f28fee4ed3f081aa0d103f2e6532272c0dd06cca8278e88374bb91ec8c13f04ef34124fb24d217040e71d5f06a6fc260b20e61854be9df7b9e83b80565f5daee051b66ffe8b8b9cd84cc4c73dba945e741bb6f618f42e0349c5f08ed928363a5077ce9a6dbb7a05d123e1b21f023c32a084daa29862cd8b20060516bdfd0802cf54a3ffc5646fa24255f1ec33b", 0x94}, {&(0x7f00000002c0)="35fbd6ac3c1993f9fd48ddba0641dc040ca19def975ae4ad5dffbdb202f748289802d08d359f610736ec3c0144f01a045cce29aef3736b1b03108eec4309b57d5b53e11dc41bd64d7301733ea3953dd12ab81f326b201a27f463e42214442564efe6faa91083a9a94bfef81d314b94e8adc73bee531a516c95dd4c83c3ba865f6bccdf9d7ebd5dbee3fb863cff86f9c2957c72f59b8651dd90e40d7ef394fd1b5f8514817241ce7df426bf77c7692d2b36b8b1bf704219936e23c740418a00623aa6a4a56ba23647e470db962481191e70ca57034655a73c8e7d3dd4", 0xdc}, {&(0x7f00000003c0)="ca01be", 0x3}, {&(0x7f0000000400)="0d98306f42f4b14f033a199aca16e293085f6cce16058dd1695e6ffc59c3adedf270c82a32f8a0c82cab37c166a8b618a3c0e1ccb7eaf02576c51ff10693119c5219ab8dfe530d7147a8e887b06e174aacae4a1d0bcefe0f8be12ff6c6cc3b7c3e714dee0be8ff133d695c060e9b78638f44d52fb75d18066c1c591162bb25321fee9de472f5e5f921572545177e33793d0ae174666cb29ad173236c160ce7be7eb9318054", 0xa5}], 0x4}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000640)="490e13ecf330c837f8f8d85c41d5a57d74891ccc9bdbad6ec93daf2be9a91f44313472b13631d9f543235faeab6f77aece8fb7d77935c22382766396ad0cce2399e71a9e58ddbbd792f788411d0d726359e27028faae52537f17cd4b9ca124f7dd414af02715a4b4d3da4540cdb067b1a3b5d6cff296c4005b2a99bd420f40f11ddb95873f12fa0d55b6fcfc24e8006ce7469b6f7873c6157d79c8afd8544008c45001e5f45b04a954ad112f7f3e27bfdf0fbcd126e6e1456c41a3038b19ef9626d6695bbfd0c67335f4ab303fde609fc7c20e44", 0xd4}], 0x1}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000c80)="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", 0x209}], 0x1}}], 0x5, 0x400c081) 16:51:00 executing program 0: read$snddsp(0xffffffffffffffff, 0x0, 0x0) 16:51:00 executing program 5: setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) 16:51:00 executing program 4: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000046c0)=[{{&(0x7f0000000080)={0xa, 0xe23, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="5ae0decced7980675bb7ffa5ff31e18f122fb5952e1216566fc2c937698133941c15a43c65898eeed063786ef09b2ace060c998105f11063e430acdf6b67a64ed3baa2136b708343edfaf274acbabfc6dfa15450be44b1a05e186c", 0x5b}, {&(0x7f0000000140)="0ee815d4e2c20d47f115f16afd11ce4bfde1d207d77026f960a789b3489645cb29fee1445ba4c8c8861b3f37030600b4cd83bd7d9200d70d13ffe0279838cf2d8637cb1a6db97d9f288f846845abcf2a9ee014bed0c8a2557165d1707c5b4231cbc5b5dececbcbcabdc791fe2dea69053323928e1072ac", 0x77}, {&(0x7f0000000040)="45fc14bb83f5a3b2c71666d503", 0xd}], 0x3}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="39feafa410c965f28fee4ed3f081aa0d103f2e6532272c0dd06cca8278e88374bb91ec8c13f04ef34124fb24d217040e71d5f06a6fc260b20e61854be9df7b9e83b80565f5daee051b66ffe8b8b9cd84cc4c73dba945e741bb6f618f42e0349c5f08ed928363a5077ce9a6dbb7a05d123e1b21f023c32a084daa29862cd8b20060516bdfd0802cf54a3ffc5646fa24255f1ec33b", 0x94}, {&(0x7f00000002c0)="35fbd6ac3c1993f9fd48ddba0641dc040ca19def975ae4ad5dffbdb202f748289802d08d359f610736ec3c0144f01a045cce29aef3736b1b03108eec4309b57d5b53e11dc41bd64d7301733ea3953dd12ab81f326b201a27f463e42214442564efe6faa91083a9a94bfef81d314b94e8adc73bee531a516c95dd4c83c3ba865f6bccdf9d7ebd5dbee3fb863cff86f9c2957c72f59b8651dd90e40d7ef394fd1b5f8514817241ce7df426bf77c7692d2b36b8b1bf704219936e23c740418a00623aa6a4a56ba23647e470db962481191e70ca57034655a73c8e7d3dd4", 0xdc}, {&(0x7f00000003c0)="ca01be", 0x3}, {&(0x7f0000000400)="0d98306f42f4b14f033a199aca16e293085f6cce16058dd1695e6ffc59c3adedf270c82a32f8a0c82cab37c166a8b618a3c0e1ccb7eaf02576c51ff10693119c5219ab8dfe530d7147a8e887b06e174aacae4a1d0bcefe0f8be12ff6c6cc3b7c3e714dee0be8ff133d695c060e9b78638f44d52fb75d18066c1c591162bb25321fee9de472f5e5f921572545177e33793d0ae174666cb29ad173236c160ce7be7eb9318054", 0xa5}], 0x4}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000640)="490e13ecf330c837f8f8d85c41d5a57d74891ccc9bdbad6ec93daf2be9a91f44313472b13631d9f543235faeab6f77aece8fb7d77935c22382766396ad0cce2399e71a9e58ddbbd792f788411d0d726359e27028faae52537f17cd4b9ca124f7dd414af02715a4b4d3da4540cdb067b1a3b5d6cff296c4005b2a99bd420f40f11ddb95873f12fa0d55b6fcfc24e8006ce7469b6f7873c6157d79c8afd8544008c45001e5f45b04a954ad112f7f3e27bfdf0fbcd126e6e1456c41a3038b19ef9626d6695bbfd0c67335f4ab303fde609fc7c20e44", 0xd4}], 0x1}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000c80)="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", 0x1e2}], 0x1}}], 0x5, 0x400c081) 16:51:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4d94}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0xffffffffffffffaf, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc06"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 16:51:00 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='ns\x00') setns(r0, 0x0) 16:51:00 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000046c0)=[{{&(0x7f0000000080)={0xa, 0xe23, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="5ae0decced7980675bb7ffa5ff31e18f122fb5952e1216566fc2c937698133941c15a43c65898eeed063786ef09b2ace060c998105f11063e430acdf6b67a64ed3baa2136b708343edfaf274acbabfc6dfa15450be44b1a05e186c", 0x5b}, {&(0x7f0000000040)="45fc14bb83f5a3b2c71666d5030cba317e", 0x11}], 0x2}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="39feafa410c965f28fee4ed3f081aa0d103f2e6532272c0dd06cca8278e88374bb91ec8c13f04ef34124fb24d217040e71d5f06a6fc260b20e61854be9df7b9e83b80565f5daee051b66ffe8b8b9cd84cc4c73dba945e741bb6f618f42e0349c5f08ed928363a5077ce9a6dbb7a05d123e1b21f023c32a084daa29862cd8b20060516bdfd0802cf54a3ffc5646fa24255f1ec33b", 0x94}, {&(0x7f00000002c0)="35fbd6ac3c1993f9fd48ddba0641dc040ca19def975ae4ad5dffbdb202f748289802d08d359f610736ec3c0144f01a045cce29aef3736b1b03108eec4309b57d5b53e11dc41bd64d7301733ea3953dd12ab81f326b201a27f463e42214442564efe6faa91083a9a94bfef81d314b94e8adc73bee531a516c95dd4c83c3ba865f6bccdf9d7ebd5dbee3fb863cff86f9c2957c72f59b8651dd90e40d7ef394fd1b5f8514817241ce7df426bf77c7692d2b36b8b1bf704219936e23c740418a00623aa6a4a56ba23647e470db962481191e70ca57034655a73c8e7d3dd4", 0xdc}, {&(0x7f00000003c0)="ca01be", 0x3}, {&(0x7f0000000400)="0d98306f42f4b14f033a199aca16e293085f6cce16058dd1695e6ffc59c3adedf270c82a32f8a0c82cab37c166a8b618a3c0e1ccb7eaf02576c51ff10693119c5219ab8dfe530d7147a8e887b06e174aacae4a1d0bcefe0f8be12ff6c6cc3b7c3e714dee0be8ff133d695c060e9b78638f44d52fb75d18066c1c591162bb25321fee9de472f5e5f921572545177e33793d0ae174666cb29ad173236c160ce7be7eb9318054", 0xa5}], 0x4}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000640)="490e13ecf330c837f8f8d85c41d5a57d74891ccc9bdbad6ec93daf2be9a91f44313472b13631d9f543235faeab6f77aece8fb7d77935c22382766396ad0cce2399e71a9e58ddbbd792f788411d0d726359e27028faae52537f17cd4b9ca124f7dd414af02715a4b4d3da4540cdb067b1a3b5d6cff296c4005b2a99bd420f40f11ddb95873f12fa0d55b6fcfc24e8006ce7469b6f7873c6157d79c8afd8544008c45001e5f45b04a954ad112f7f3e27bfdf0fbcd126e6e1456c41a3038b19ef9626d6695bbfd0c67335f4ab303fde609fc7c20e44", 0xd4}], 0x1}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000c80)="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", 0x27d}], 0x1}}], 0x5, 0x400c081) 16:51:00 executing program 4: getitimer(0x2, &(0x7f0000000340)) 16:51:00 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) 16:51:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2", 0x3f}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:00 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x28}, 0x28) 16:51:00 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 16:51:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 16:51:01 executing program 5: request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='keyring\x00', 0x0) 16:51:01 executing program 2: eventfd2(0x0, 0x80003) epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000180)={0x10}) r0 = socket$inet(0x2, 0xa, 0xba) socket$inet(0x10, 0xa, 0x104) clock_gettime(0x6, &(0x7f0000000080)) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000003, 0x2010, r0, 0xffffc000) open(&(0x7f0000000300)='./file0\x00', 0x185e00, 0x14) personality(0x5000007) socket$inet6(0xa, 0x800, 0x536fb23) ioctl(0xffffffffffffffff, 0x8, &(0x7f00000002c0)="295ee12b1f16bf120106f1") epoll_create1(0x80006) r1 = socket(0x1d, 0xeba9af94e666b680, 0x6) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000040)) r2 = mq_open(&(0x7f0000000500)='eth0\x00&\x10\xde\xdb:S\xae\xa4\x03n;D\x8e\x1a\n\x12\xf1)\x9b\xbe\xdb\xb7T\xd7\xe4\xf9z\xb7 \xb0\x1ck\xbd-\xc1\x00\xb9F\x1302u\xe8\xd4d\xbcB3\xce35\xe8\x82\xb3<\x89!&|\x92\xae\xfb\x13%\xa1\xc1\x80\x82\x97\xbb\b\x15\xfb\xfb\xfd\xc3~16\xc0\xbb*\xdb\x8aeB\xe7\xf7\x86\x12\xc4\xfav\x0e\xf7\x15\a\x81\x88j3', 0x42, 0x0, &(0x7f0000000340)={0x0, 0x7, 0x6, 0x3}) mq_timedsend(r2, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 16:51:01 executing program 3: msgsnd(0x0, &(0x7f0000008b40)={0x2}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/186}, 0xc2, 0x0, 0x0) 16:51:01 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0xfffffffffffffffa) 16:51:01 executing program 5: pipe2$9p(0x0, 0x180000) 16:51:01 executing program 3: add_key$keyring(&(0x7f0000004480)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, 0x0, 0x0) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) request_key(&(0x7f00000049c0)='trusted\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000004b00)='gtp\x00') 16:51:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2", 0x3f}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newsa={0x104, 0x10, 0x21, 0x0, 0x0, {{@in6=@mcast1, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@mcast2, 0x0, 0x2b}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}}, 0x0) 16:51:01 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x2, 0x0) 16:51:01 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/snmp\x00') [ 350.337938] mip6: mip6_rthdr_init_state: state's mode is not 2: 0 16:51:01 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, 0x0) 16:51:01 executing program 3: syz_init_net_socket$ax25(0x3, 0x2, 0xf0) 16:51:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vhost_msg(r0, &(0x7f0000000180)={0x1, {0x0, 0x0, 0x0}}, 0x48) 16:51:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) 16:51:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='keyring\x00', r0) 16:51:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152", 0x49}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:02 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_names\x00') 16:51:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000680)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="a0000000000000002900000037000000e5100000000000000106000000000000010900000000000000000001080000000000000000c20400000401071800000003043f010001f8ffffffffffff1f00000000000000c91000000000000000000000ffffac1414230730000000030a8100000700000000000000d500000000000000040000000000000005000000000000000700000000000000c20400000004001400000000000000290000003e00000006"], 0x2d0}}], 0x1, 0x0) 16:51:02 executing program 2: socketpair(0x9, 0x0, 0x0, 0x0) 16:51:02 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e3, &(0x7f0000001880)) 16:51:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4d94}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x802, 0x88) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0xffffffffffffffaf, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc06"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 16:51:02 executing program 5: r0 = socket(0xa, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 16:51:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000007880)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast2, 0x6}, 0x1c, 0x0}}], 0x1, 0x0) 16:51:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152", 0x49}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) 16:51:05 executing program 5: r0 = socket(0x2b, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:51:05 executing program 3: openat$md(0xffffffffffffff9c, &(0x7f0000001100)='/dev/md0\x00', 0x0, 0x0) 16:51:05 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:51:05 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000d80)='/dev/snd/pcmC#D#p\x00', 0x0, 0x400) 16:51:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x70000, 0x0) waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f0000000680)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, 0x0, 0x10, 0x0, 0x25dfdbfd}, 0x14}}, 0x0) 16:51:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={[], [], @multicast2}, @private1}}) 16:51:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_names\x00') read$snddsp(r0, &(0x7f00000000c0)=""/238, 0xee) 16:51:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152", 0x49}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:05 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) 16:51:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:08 executing program 0: syz_genetlink_get_family_id$gtp(0x0) 16:51:08 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000c00)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x4008855) 16:51:08 executing program 2: r0 = add_key$keyring(&(0x7f0000004480)='keyring\x00', &(0x7f00000044c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r0, 0xee00, 0x0) 16:51:08 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x10000) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000dc0)='ns/ipc\x00') 16:51:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2", 0x4e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:08 executing program 5: r0 = socket(0x2b, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) 16:51:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) dup2(r2, r3) 16:51:08 executing program 3: 16:51:08 executing program 2: 16:51:08 executing program 3: 16:51:08 executing program 5: 16:51:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:11 executing program 2: 16:51:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2", 0x4e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:11 executing program 3: 16:51:11 executing program 0: 16:51:11 executing program 5: 16:51:11 executing program 0: 16:51:11 executing program 3: 16:51:11 executing program 5: 16:51:11 executing program 0: 16:51:11 executing program 2: 16:51:11 executing program 3: 16:51:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:14 executing program 0: 16:51:14 executing program 5: 16:51:14 executing program 2: 16:51:14 executing program 3: 16:51:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2", 0x4e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:14 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000280)={'sit0\x00', @ifru_addrs=@tipc}) 16:51:14 executing program 5: setresuid(0xee01, 0xee00, 0xee01) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x0) 16:51:14 executing program 2: set_robust_list(&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0xc0, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x0, 0x0, 0x8, 0x7, 0xffffffffffffffc0, 0xfffffffffffffffc}]}, &(0x7f0000000180)='GPL\x00', 0xffffffc0, 0x1e, &(0x7f00000001c0)=""/30, 0x41000, 0x1, [], 0x0, 0xe6a7ae20572c4298, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$KVM_SET_REGS(r1, 0x4090ae82, 0xfffffffffffffffd) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000340)={0x0, 0xff, 0x3, 0x1}) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000740)) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000780)={0x3580000000000000, 0x3000, 0x100000001, 0x0, 0x1e}) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000007c0)={0xff, 0x400}) sched_getscheduler(0x0) clone(0x65008000, &(0x7f0000000800)="bfb4aed4ecc121d6130e9312d19c6f81486bf78cdf45310499712f7cc7eaadf9d241e375c0deaed801fba3d080d0b472b45041bbbaa1e1ed61b2d8c6cef97268e594b9097e4efab485aef4296461fd941024964be91b", &(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) 16:51:14 executing program 0: setresuid(0xee00, 0xee01, 0xee01) r0 = getuid() getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setresuid(0xffffffffffffffff, r0, r1) 16:51:14 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8901, &(0x7f0000000240)={'lo\x00', @ifru_addrs=@tipc}) 16:51:14 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) clock_gettime(0x0, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x4}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 363.460863] IPVS: ftp: loaded support on port[0] = 21 [ 363.679107] IPVS: ftp: loaded support on port[0] = 21 16:51:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:17 executing program 0: syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x4813, 0x4400) 16:51:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe", 0x51}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000007940)=[{{&(0x7f0000006f80)=@hci, 0x80, 0x0}}], 0x1, 0x0, &(0x7f00000079c0)) 16:51:17 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x4, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlock(&(0x7f0000b93000/0x3000)=nil, 0x3000) mremap(&(0x7f0000fd3000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000319000/0x1000)=nil) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) 16:51:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000001180)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:51:17 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f000000f040), 0x0) 16:51:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x0, 0xc00}, {0x0, 0x4}, {}], 0x3) semop(0x0, &(0x7f0000000100)=[{0x0, 0xffff}], 0x1) semop(0x0, &(0x7f0000000080)=[{0x0, 0x9}], 0x1) 16:51:17 executing program 0: 16:51:17 executing program 3: 16:51:17 executing program 5: 16:51:17 executing program 0: 16:51:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe", 0x51}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:20 executing program 3: 16:51:20 executing program 5: 16:51:20 executing program 0: 16:51:20 executing program 2: 16:51:20 executing program 3: 16:51:20 executing program 5: 16:51:20 executing program 0: 16:51:20 executing program 2: 16:51:20 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) 16:51:20 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, 0x0, r0) 16:51:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:23 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00') 16:51:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe", 0x51}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:23 executing program 5: syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@link_local, @link_local, @val={@void, {0x8100, 0x0, 0x1}}, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "481257", 0x10, 0x21, 0x0, @loopback, @loopback, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "62a767", 0x0, "79211f"}}}}}}}, 0x0) 16:51:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc) 16:51:23 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f00000036c0)=[{r0}, {}], 0x2, &(0x7f0000003700), &(0x7f0000003740)={[0x4]}, 0x8) 16:51:23 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x200, &(0x7f0000003000/0x1000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/54) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x14}}, 0x22000001) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xc0, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5b}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_SOCK={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x96}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x94}, 0x4000000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340)='ethtool\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000003c0)={'wg2\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000000540)={&(0x7f0000000300), 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xe0, r3, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x4080}, 0x5) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000005c0)={0x0, @empty, @multicast2}, &(0x7f0000000600)=0xc) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000640)={'ip6_vti0\x00', r4, 0x2f, 0x1, 0x5, 0x6, 0x18, @private2={0xfc, 0x2, [], 0x1}, @ipv4={[], [], @rand_addr=0x64010101}, 0x10, 0x8000, 0x66f, 0x200}}) r7 = accept(r2, &(0x7f0000000780)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000800)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000840)={'vxcan1\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000b00)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000880)={0x210, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}]}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x40}, 0x880) msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f0000000b40)=""/19) sendmsg$NLBL_CIPSOV4_C_LIST(r7, &(0x7f0000000d40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000bc0)={0x138, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x11c, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ef193fa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18eba0d0}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x24abcb96}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf6}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3893ee08}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x695efeb9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xad}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x27b9c927}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2c497399}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x62}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x23}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1c9254aa}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xae}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x21a08313}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2042d5d9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x784d7282}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x77618b6d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x60002569}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x133ed6c9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b644e1}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x83}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3557bb0e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xab}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2430ba90}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7d}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x138}, 0x1, 0x0, 0x0, 0x20000800}, 0x8004081) shmctl$SHM_LOCK(r0, 0xb) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000d80)='ns\x00') syz_genetlink_get_family_id$wireguard(&(0x7f0000000e00)='wireguard\x00') 16:51:23 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) fcntl$getflags(r0, 0x2) 16:51:23 executing program 5: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) select(0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0, r0/1000+60000}) 16:51:23 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) 16:51:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc2040, 0x0) close(r0) 16:51:23 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000004000), 0x8, 0x0) signalfd4(r0, &(0x7f0000000000), 0x8, 0x0) 16:51:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:26 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x2b}, 0x0, @in=@dev, 0x0, 0x4}}, 0xe8) 16:51:26 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[], 0x303b5bca) r2 = socket$inet6(0xa, 0x80003, 0x11) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 16:51:26 executing program 0: syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x2, 0x12d242) 16:51:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe39", 0x52}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="20000000000301"], 0x20}}, 0x0) 16:51:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc) 16:51:26 executing program 0: socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000002740)='IPVS\x00') socket$key(0xf, 0x3, 0x2) [ 375.377702] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 16:51:26 executing program 3: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x21000040) 16:51:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe39", 0x52}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) [ 375.412707] audit: type=1400 audit(1602953486.482:33): avc: denied { audit_read } for pid=17025 comm="syz-executor.3" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 16:51:26 executing program 5: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000002c0)=""/179) 16:51:26 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10800, 0x0) 16:51:29 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000004000), 0x8, 0x0) fcntl$getflags(r0, 0x40a) 16:51:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 16:51:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:29 executing program 0: io_setup(0x3c2f, &(0x7f0000000080)=0x0) r1 = socket$netlink(0x10, 0x3, 0x0) io_submit(r0, 0x1, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r1, 0x0}]) 16:51:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0xe, 0x6, 0x101}, 0x14}}, 0x0) 16:51:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe39", 0x52}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000180)=0x7, 0x4) 16:51:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x30, 0x0, 0x7, 0x801, 0x0, 0x0, {}, [@NFACCT_BYTES={0xc}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x4}]}, 0x30}}, 0x0) 16:51:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x1000, 0x4) 16:51:29 executing program 0: socketpair(0x1, 0x0, 0x6, 0x0) 16:51:29 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='net/vlan/config\x00') 16:51:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000), 0x4) 16:51:29 executing program 3: mq_unlink(&(0x7f00000000c0)='NS\xb5\xe8P\x12\xad-|\x88({;\xf3\xd7K\xd5\x021O\xaf\xd4\x1d\xe5\x15gw\xd0\xcb\xf7\xe8\x80\x93\xe0y\xd7\xa9L!\x0f\xa8\x00\x04\x00\x00\x00\x0f0TuE~\xb6\xb7\x80\x06r\x1el\xbd\xd0QY\x1a4\x18u\xcc\xa2\x88\xdcfE\x1e!0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r1, 0x3, &(0x7f00000008c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, 0x0]) 16:51:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000300)={'syztnl0\x00', 0x0}) 16:51:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000780)='net/vlan/vlan1\x00') 16:51:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:32 executing program 3: socket$inet6(0xa, 0x400, 0x0) 16:51:32 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000002480)='/dev/rtc#\x00', 0x0, 0x0) close(r0) 16:51:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/unix\x00') r2 = dup2(r0, r1) readahead(r2, 0x0, 0x0) 16:51:32 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x8) fcntl$getflags(r0, 0x3) 16:51:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:32 executing program 3: syz_emit_ethernet(0x9e, &(0x7f00000001c0)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x68, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@sack={0x5, 0x1a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @fastopen={0x22, 0x6, "aaae2965"}, @fastopen={0x22, 0x12, "26d13206ac8206171a0cdd81ee49a49a"}, @md5sig={0x13, 0x12, "9533e062c17afbcc911cc9f426041419"}, @exp_fastopen={0xfe, 0x9, 0xf989, '\x00\x00\x00\x00\x00'}, @mptcp=@generic={0x0, 0x4, '[X'}]}}}}}}}}, 0x0) 16:51:32 executing program 0: socket(0x0, 0x961c4c5b7a91cc09, 0x0) 16:51:32 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x8) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@flowinfo={{0x14}}], 0x18}, 0x0) 16:51:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:32 executing program 2: add_key(&(0x7f0000000000)='id_legacy\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 16:51:32 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2e0540, 0x0) close(r0) 16:51:32 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') 16:51:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000940)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 16:51:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:33 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x8) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0}, 0x0) 16:51:33 executing program 0: io_cancel(0x0, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 16:51:33 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000001400)={0x0, 0xfe, [], [@generic={0x0, 0x7ef, "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"}]}, 0x800) 16:51:33 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) 16:51:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x24000844) 16:51:33 executing program 0: getrusage(0xffffffffffffffff, &(0x7f0000000280)) 16:51:35 executing program 3: io_setup(0xffff, &(0x7f0000000080)) 16:51:35 executing program 0: request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0xfffffffffffffffc) 16:51:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, &(0x7f00000002c0)) 16:51:35 executing program 2: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000240)=""/161) 16:51:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:36 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000004000), 0x8, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0xffffffff80000000) 16:51:36 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x482c0, 0x0) 16:51:36 executing program 0: io_setup(0x6, &(0x7f0000000000)=0x0) r1 = memfd_create(&(0x7f0000000080)='+\\(\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f00000000c0)="4cd75194cfc6d57065", 0x9}]) 16:51:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="b70000000000000007000000f80400009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002c80)=ANY=[@ANYBLOB="b70000000000000007000000000000009500000000000000f8c053d5b8ed4aaf046c99c87f0a8a096389300612e314030f46a6f63820d29d2f5f44e758e4030b223fd6840977cf9e7afb35464d0b35e3fd0300c4b67831a9934189336a325f4e4964fd4ed3485d2460fde1cc1d8f2263a927766c0dbfe2d74fcd55179e1c425ab9c1e18881c6344647ca"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) dup2(r1, r0) 16:51:36 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newqdisc={0x154, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0xffffffff}, @TCA_CHOKE_PARMS={0x14}, @TCA_CHOKE_STAB={0x104, 0x2, "8e2c1b702568a3f5b7e5a8f972634fbff79944366883ff270a8356c7c70bc74995b0c6175a547774d68fe2e449f754732e77bf0fae77d6f74b462bc7c140b57d4d30d27fa83cab1f066ef441cf071b28a77fca121c442101a4cdf2bec30454cb5bca924d009bb9d9412d70e64007153a0ff1f7a2f08ae8350486b857bdce6f29fcca7f89b46634e37e2267be047df344227c437d7cc62b2f80b99374c9f1aa998f9787b0dd0629c08356de470230d7c16950fed7450c8f7f9be29af156cd70ee8d3e3a47c616ace83ee5c46ae447893489287c5f8e446238764965037c033a3b9cb8904522292dc0349d2e08a55b782ba362f6d0e49e547921787e19a05c5351"}]}}]}, 0x154}}, 0x0) 16:51:36 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 16:51:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:36 executing program 3: clone(0x2182209bfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x4, 0x32c, 0x0, 0x0, 0x0, 0x19c, 0x0, 0x1f4, 0x298, 0x298, 0x298, 0x1f4, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@multicast2, @multicast1, 0x0, 0x0, 'batadv_slave_1\x00', 'syzkaller1\x00'}, 0x0, 0x70, 0xcc}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}, {{@ip={@loopback, @private, 0x0, 0x0, 'wlan0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xd8, 0xfc, 0x0, {}, [@common=@unspec=@rateest={{0x68, 'rateest\x00'}, {'veth1_to_bridge\x00', 'vlan0\x00'}}]}, @REJECT={0x24, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x388) 16:51:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:39 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x380000, @empty}, 0x1c) 16:51:39 executing program 0: 16:51:39 executing program 3: 16:51:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:39 executing program 0: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000018c0)='/proc/thread-self\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8904, &(0x7f0000000040)) 16:51:39 executing program 3: syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @random="fc395071b4ba", @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0x14, 0x7, 0x3, 0x0, [{@empty}, {@local}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) 16:51:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="0503092c1116480401020200c52cf7c25975e005b02f0800eb2b2ff0dac8897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 16:51:39 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@private0, 0x800, 0x0, 0x3, 0x9}, 0x20) 16:51:39 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:42 executing program 3: 16:51:42 executing program 5: 16:51:42 executing program 0: 16:51:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:42 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 16:51:42 executing program 0: 16:51:42 executing program 5: 16:51:42 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 16:51:42 executing program 3: 16:51:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000100)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 16:51:42 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) 16:51:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:45 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000100)=[{0x4}], 0x1) 16:51:45 executing program 5: pipe2(&(0x7f0000005480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, 0x0) 16:51:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:45 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}]}}}}}}, 0x0) 16:51:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 16:51:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, 0x0, &(0x7f00000000c0)) 16:51:45 executing program 5: open$dir(&(0x7f0000000140)='./file0\x00', 0x200840, 0x0) 16:51:45 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}]}}}}}}, 0x0) 16:51:45 executing program 0: 16:51:45 executing program 3: 16:51:45 executing program 0: 16:51:48 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}]}}}}}}, 0x0) 16:51:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:48 executing program 0: 16:51:48 executing program 3: 16:51:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:48 executing program 5: 16:51:48 executing program 0: 16:51:48 executing program 5: 16:51:48 executing program 3: 16:51:48 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:48 executing program 0: 16:51:48 executing program 5: 16:51:48 executing program 3: 16:51:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:51 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000800)={'ip6tnl0\x00', &(0x7f0000000780)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}}) 16:51:51 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:51 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb}, 0x40) 16:51:51 executing program 3: unshare(0x6c060000) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000400)=""/4096, 0x7e, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @rand_addr, 0x4}, 0x1c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r4, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x40001) listen(r2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r5, &(0x7f0000000000)=""/35, 0xffffffffffffff13, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r6 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x600000000000004) 16:51:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0xc, 0x4) 16:51:51 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:51 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000000)={@random="ff0052ca6a51", @local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}}}, 0x0) [ 400.364768] IPVS: ftp: loaded support on port[0] = 21 16:51:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:51 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x4) getsockopt$inet_mreq(r0, 0x0, 0x15, 0x0, &(0x7f0000000040)) 16:51:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x7}]}]}}, &(0x7f00000001c0)=""/218, 0x32, 0xda, 0x1}, 0x20) 16:51:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 16:51:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:51 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0x4, 0x5}]}}}}}}, 0x0) 16:51:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 16:51:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x6, 0x12, 0x0, &(0x7f0000000080)) 16:51:52 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0x4, 0x5}]}}}}}}, 0x0) 16:51:52 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000040)={@link_local, @multicast, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, '@{V', 0x10, 0x21, 0x0, @remote, @dev, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, "c34b65"}}}}}}}, 0x0) 16:51:52 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) 16:51:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 16:51:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:51:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:52 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@rand_addr, @dev}, 0x10) 16:51:52 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x7, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0x4, 0x5}]}}}}}}, 0x0) 16:51:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000001c0)=0x14, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'virt_wifi0\x00'}) 16:51:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x1600bd80, &(0x7f0000000000), 0x4) 16:51:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x6, 0x4) 16:51:52 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:51:52 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/16, 0x101000, 0x800}, 0x20) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000280), 0x4) 16:51:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:51:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x1) 16:51:52 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:52 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1c1e7}, 0x78) 16:51:52 executing program 0: 16:51:53 executing program 4: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:53 executing program 5: 16:51:53 executing program 2: syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:53 executing program 0: 16:51:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r2}) 16:51:53 executing program 3: 16:51:53 executing program 5: 16:51:53 executing program 0: 16:51:53 executing program 4: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:53 executing program 3: 16:51:53 executing program 5: 16:51:53 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x0, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:53 executing program 0: 16:51:53 executing program 5: [ 402.469434] ptrace attach of "/root/syz-executor.4"[17528] was attempted by "/root/syz-executor.4"[17531] 16:51:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:53 executing program 4: clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:53 executing program 3: 16:51:53 executing program 0: 16:51:53 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x0, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:53 executing program 5: 16:51:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 402.649773] ptrace attach of "/root/syz-executor.4"[17539] was attempted by "/root/syz-executor.4"[17542] 16:51:53 executing program 5: 16:51:53 executing program 0: 16:51:53 executing program 3: 16:51:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:53 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0xc, 0x0, 0x3, 0x0, [{@empty}]}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:53 executing program 3: 16:51:53 executing program 5: 16:51:53 executing program 0: 16:51:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:54 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0x4, 0x7}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:54 executing program 3: 16:51:54 executing program 0: 16:51:54 executing program 5: 16:51:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:54 executing program 5: 16:51:54 executing program 3: 16:51:54 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0x4, 0x7}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:54 executing program 0: 16:51:54 executing program 3: 16:51:54 executing program 5: 16:51:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:54 executing program 0: 16:51:54 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @generic={{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_prespec={0x7, 0x4, 0x7}, @timestamp_addr={0x44, 0xc, 0x5, 0x1, 0x0, [{@multicast1}]}]}}}}}}, 0x0) 16:51:54 executing program 5: 16:51:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:54 executing program 3: 16:51:54 executing program 0: 16:51:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:54 executing program 5: 16:51:54 executing program 3: 16:51:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0xf4, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:54 executing program 2: 16:51:54 executing program 0: 16:51:54 executing program 5: 16:51:54 executing program 3: 16:51:54 executing program 2: 16:51:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:55 executing program 0: 16:51:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:55 executing program 3: 16:51:55 executing program 5: 16:51:55 executing program 2: 16:51:55 executing program 0: 16:51:55 executing program 5: 16:51:55 executing program 3: 16:51:55 executing program 2: 16:51:55 executing program 5: 16:51:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:55 executing program 3: 16:51:55 executing program 0: 16:51:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:51:58 executing program 5: 16:51:58 executing program 3: 16:51:58 executing program 2: 16:51:58 executing program 0: 16:51:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:58 executing program 5: 16:51:58 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 16:51:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, 0x0, 0x0) 16:51:58 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000140)={@local, @broadcast, @val, {@ipv6}}, 0x0) 16:51:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:51:58 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000200)={@local, @empty, @val, {@ipv4}}, 0x0) 16:52:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:01 executing program 5: r0 = socket(0x1c, 0x10000001, 0x84) bind(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 16:52:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)=' ', 0x1}, {&(0x7f00000000c0)="c08c3d", 0x3}], 0x2}, 0x0) 16:52:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, &(0x7f0000000080)="1781ddef99b2fe18", 0x8, 0x0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 16:52:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x8001ffff, 0x8000, 0x0, 0x0, 0x4}, 0x98) 16:52:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:01 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f00000002c0)=ANY=[@ANYRES32], &(0x7f0000000240)=0x5b) 16:52:01 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x40000, 0x0) 16:52:01 executing program 3: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 16:52:01 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:52:01 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) bind(r0, &(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c) 16:52:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@un=@abs={0x8}, 0x8) 16:52:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB="1c1c4e200000000000000000000000000000ffff7f00000100"/128, @ANYRES32=0x0, @ANYBLOB="202a650053bc5edba5"], 0x98) 16:52:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) 16:52:04 executing program 0: syz_emit_ethernet(0x26, &(0x7f0000000200)={@local, @empty, @val, {@ipv4}}, 0x0) 16:52:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000002040)="92", 0x1, 0x0, &(0x7f0000002100)={0x10, 0x2}, 0x10) 16:52:04 executing program 3: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 16:52:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@in6={0x1c, 0x1c}, 0x1c) 16:52:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x1b00}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) 16:52:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:04 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x3b, &(0x7f0000000080), 0x4) 16:52:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:07 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @loopback, @local, @broadcast}}}}, 0x0) 16:52:07 executing program 2: syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @local, @val, {@ipv6}}, 0x0) 16:52:07 executing program 0: accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 16:52:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:07 executing program 3: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)=@un=@abs={0x8}, 0xfffffffffffffedd) 16:52:07 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @random="33f4646650d7", @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @broadcast, @local={0xac, 0x14, 0x0}}}}}, 0x0) 16:52:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x20180) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB="1c1c4e200000000000000000000000000000ffff7f00000100"/128, @ANYRES32=0x0, @ANYBLOB="00000000000000e24df4afdb1d39c9ffff"], 0x98) 16:52:07 executing program 3: setgroups(0x4, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) 16:52:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000040)={0x0, 0xa3, 0x1, [0xee9]}, 0xa) 16:52:07 executing program 0: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x5) 16:52:07 executing program 2: nanosleep(0x0, &(0x7f0000000040)) 16:52:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:10 executing program 3: rmdir(&(0x7f0000000440)='./file0\x00') 16:52:10 executing program 5: link(&(0x7f0000000140)='./file0\x00', 0x0) 16:52:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:10 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x8, 0x0) 16:52:10 executing program 0: lstat(&(0x7f0000000540)='./file0\x00', 0x0) 16:52:10 executing program 0: 16:52:10 executing program 2: 16:52:10 executing program 3: 16:52:10 executing program 5: 16:52:10 executing program 2: 16:52:10 executing program 0: 16:52:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0xfffffffffffffdd6, &(0x7f0000000100)=[{0x10, 0x0, 0x0, "d31941f9ad267746b54a0e1a3b5aae43c90bf59ebad8a108d43d06e0a53045b06a514a5d58347c19d775933715ce398db53d6917de5899d39c9e9600526b33812a72253102c4822a833c4b041bdc74657b93e80dd28ec9499f5d29e8466c5d4915d4e67675fedae0d2e282e587066efc5d5f2c8be332fc"}], 0x10}, 0x185) 16:52:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:13 executing program 5: 16:52:13 executing program 2: 16:52:13 executing program 0: 16:52:13 executing program 2: 16:52:13 executing program 0: 16:52:13 executing program 3: 16:52:13 executing program 5: 16:52:13 executing program 2: 16:52:13 executing program 0: 16:52:16 executing program 3: 16:52:16 executing program 5: 16:52:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:16 executing program 2: 16:52:16 executing program 0: 16:52:16 executing program 3: 16:52:16 executing program 5: 16:52:16 executing program 2: 16:52:16 executing program 0: 16:52:16 executing program 5: 16:52:16 executing program 3: 16:52:16 executing program 0: 16:52:16 executing program 2: 16:52:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf4}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:19 executing program 5: 16:52:19 executing program 0: 16:52:19 executing program 3: socketpair(0x2, 0x3, 0x87, &(0x7f0000000000)) 16:52:19 executing program 2: socketpair(0x27, 0x0, 0x0, &(0x7f0000000200)) 16:52:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000140)=""/160, 0x1a, 0xa0, 0x1}, 0x20) 16:52:19 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000280)="d36389ce0d47243b8a0dc23cc8489e27b243e508fb0f62c8ddccf94c935b2624092f9f9803a02e2e95bc64806224ce61f822e2ea65bafa0c1a8906176378cddbfea70b94968d037536708ed5c369da1939c84d5228fcc666a8d5bcd67d759d01be70bdea34221f0acb9bb95aac2dfbfcfa738b65fe4a1bb2ccfccade64ac4004f47ab2dbbeb27cd6312d1189b0a25de4194002e0c472e1278bec9755aac66c0bf7dea5cc51ad3bad0264572af962812ad16a6ad41c3d96829d1479b291a7670ed53e09182361a17d584aaab36c9700d927ca31d0ccac4a984af2731a220b88b3b4e6cc197fc6218d6e0d3eb4a1eeaa9c5d8f4a96a0ee46f237b3693a09e6be7d04f46617ba82d7b179cbba264abca603bff1a2b37034a741cf14f93b7d7082ff428a4ae1c5c3bb6ce9748b0ac59df77a639e90b372df00cadcaf680111e150c701e0395cef940ad34e2814565ebdb1ff0c9d7e4cd0f2bcbb1e2785f3d7c23e123077869ebe2298e8554e5cdb74745efb3059aa5ca8db8bd047f06b068812cc6a03b0627c08b4efd01fb3e7ea817a771927fd17bfae51adfbdbcb8ffca4c74db4a01e5a9e16d41eabd16230b6245834c8f25e8e7581017c1f9b9b832d2d2e0ba80502bba79921c6b18cd3f4811978a35ee5f0b997bc55e696166b80e6f0ec477d3ab10c20861080f70e15656777d9a6de45f28bddd4b9d4cebcd5b2a66ce65603cc7677433cb1c4bca6cb4081b724be8b8d3ec7b2156128ac829e6adf3e5fcb12a80858c511fa60c6a72c0cf21c2fb4e3afa553d4ff8dab55332eeb611bd2fea79ca6600d4dcace49d50542590a9d96bbe93ad1ce0e62a48a21c0466c4b51b08562956b8b93f52d47c9e0634e3b75eaf155167f82ad21eb76b44f9bf0379a99672acff2aefdd609208cab70cd2b5774c58de59bc73702c1095a26ca4b634f5575c03392ad4cb2c7e46b69a052667ee1877ded71829bdd3ac7808e38ad2cc15af338b049c398a00c48ba55f62f5a282b061b9167baf1b4d392ae56b2592d597c98d897cb774a392b18c427f530894ed160bd3c91d19268380be4a56b102de4e59dbdeabedd8b0f66d7321300ab08ed10286e374a9380d23461d0207ed2291f3393c99657eb13b7de80f72d52d6773e38f3ddd9d925715c92aab81b462efda4e368ca7bbed29a201a1a6371e38d50c66e5c36e63c00fb94bc05fd3f3f4c40c81a9aaf4f518c50e5131e56dbe69029f25470760549dcc03b37fd5cc21ce1bebe752d7ba0f74545698ed4ea4059608d2f14fd06ba83658dfea1e6d0f4ac82af7c1e75a5c6418a5b41d50f326f7c2908144e61123e8063a0096ee50cf15d7815a49012fe048b30a533c58f16dc6aad228abd8a4de30df19e23715338265c7e4226922eb67e0d6f6ee185f245954133d3a572a496f0567ac9f83407e3532399f8d603717f18dba7a5b1130a6e145b8f6962acd8fb4c603fde072e0172b6402dda1495152a29dee3b44684c034c5a1974acd7e1883832e1440fa4df4ec771442c3bebc72a4e9f96035f154a0bf1e83be08a483285a5558928b6feed7ef15184f73a6c93bd2ad2978b2bf5063d03ec1f770fe53a7d9770167ed799296bdc0ba24f0f504fc78cfca5bd62002df2968b5381073a125d2ce74f6d2f1bec103d6a275328cd6b1a466c7d12f5b4877eb134eb61f453707af779550ed00ccf6d078dcc87ab999b1f77eca1458cd5037c66f4099edff95e6287e86395190a979dfb1cca147bcf2e75a3f910ac7a844fefea9f488d5b6ec1f145245457130eadf1910e1a483281b32d7289ea22c90dca07084a58a17da5d805ef19a7684df789498a7c28751c355e588440ff8e0eb50e95768e69b56061ab1a692e4d09887d93216e71fcff0c66556af4ffb794d6c12111ce2a89d90941f79af35ba8cc96efd38462b2fb0a2ee4140121832e3a2f24621ebf0c1203d83ce37731c40aa4be62121844f10ea16a3911d3e3063141ecbf989c40f96326328e8e2d652f43cb768cbbbfa7097b2ddf3db6ca091a10f17ed0b2233e763f23ba1e80c97e167c365eb6145b62b5f8e7f39e0e7570103e536011f22d2b60906bace2910b7405a8b5090cbadf9e250ff57632d10871fc3cca2df6594ba38115ad05cbaf8a2dea41e09698e14f2ab", 0x5fa}], 0x1}, 0x0) r0 = socket$kcm(0x11, 0x8000000000000003, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0xff5f) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000006c0)=@nfc={0x104, 0x7}, 0x60, &(0x7f0000000140)=[{&(0x7f00000027c0)="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", 0x5}, {&(0x7f0000000840)='\x00', 0x49ed}], 0x2, 0x0, 0x0, 0x1a0}, 0xe869) 16:52:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x23, 0x5, 0x2, &(0x7f0000000140)) 16:52:19 executing program 2: socket$kcm(0x29, 0x7dee52c691635db3, 0x0) 16:52:19 executing program 0: 16:52:19 executing program 2: 16:52:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x108}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:22 executing program 5: 16:52:22 executing program 0: 16:52:22 executing program 3: 16:52:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:22 executing program 2: 16:52:22 executing program 3: 16:52:22 executing program 2: 16:52:22 executing program 0: 16:52:22 executing program 5: 16:52:22 executing program 2: 16:52:22 executing program 3: 16:52:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x108}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:25 executing program 5: timer_create(0x9996f1d970de61e, 0x0, 0x0) 16:52:25 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x80, 0x0) 16:52:25 executing program 2: sched_getparam(0x0, &(0x7f0000000080)) 16:52:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed364877"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{}, "5211055e87f2a73e", "f614000d01f2a7b9d6a7ef9dd9629a86c0826a552617c29416196d16258733b1", "a1f4cc52", "222c76e959a8cdf0"}, 0x38) 16:52:25 executing program 0: r0 = inotify_init() ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, 0x0) 16:52:25 executing program 3: clone(0x64ae4300, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) listen(r0, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000001800), &(0x7f0000001840)=0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, 0x0, 0x0) 16:52:25 executing program 2: 16:52:25 executing program 5: clone(0x6300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) rt_sigreturn() 16:52:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:25 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x50000140) 16:52:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x108}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:28 executing program 3: capget(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6572}) 16:52:28 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 16:52:28 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) 16:52:28 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 16:52:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:28 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) [ 437.593708] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 16:52:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 16:52:28 executing program 3: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x730bbdd64e2ea5f6) 16:52:28 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101040, 0x0) 16:52:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:28 executing program 0: get_mempolicy(0x0, &(0x7f0000000040), 0x5, &(0x7f0000ffc000/0x4000)=nil, 0x4) 16:52:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x108}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:31 executing program 3: 16:52:31 executing program 5: 16:52:31 executing program 2: 16:52:31 executing program 0: 16:52:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:31 executing program 3: 16:52:31 executing program 2: 16:52:31 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8983, &(0x7f0000000240)) 16:52:31 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cgroup.stat\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x12) 16:52:31 executing program 3: socketpair(0x15, 0x5, 0xff, &(0x7f00000004c0)) 16:52:31 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x2028c49a}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 16:52:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x108}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:34 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000240)) close(r0) 16:52:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x8, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:34 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8906, 0x0) 16:52:34 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8946, &(0x7f0000000240)) 16:52:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000000)=@framed={{}, [@exit, @map, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0xfb, &(0x7f0000000180)=""/251, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x11, 0x0, 0x300) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @local}}}], 0x20}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x8, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x246c3}], 0x1}, 0x60) 16:52:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000040)='GPL\x00', 0x3, 0xf6, &(0x7f0000000080)=""/246, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40719, 0x7fff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x205, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x1000000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r0) close(r1) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7, 0x1, 0x7, 0x0, 0x0, 0xf6, 0x245, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100)}, 0x0, 0x9, 0x1f, 0x0, 0xfffffffffffffbff, 0x4}, 0x0, 0xb, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 16:52:35 executing program 5: 16:52:35 executing program 0: 16:52:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x108}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:37 executing program 3: 16:52:37 executing program 0: 16:52:37 executing program 5: 16:52:37 executing program 2: 16:52:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @multicast1}, {}, 0x0, {0x2, 0x0, @local}, 'geneve1\x00'}) 16:52:37 executing program 0: openat$bsg(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) 16:52:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setown(r0, 0x4, 0x0) 16:52:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000100), 0x4) 16:52:38 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000100)={0x0, &(0x7f0000000040)=""/179, 0x0, 0xb3}, 0x20) 16:52:38 executing program 3: select(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0x7}, &(0x7f0000000200)) 16:52:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf8}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x4a, 0x0, 0x0) 16:52:40 executing program 2: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="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", 0x171) 16:52:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:40 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="97d138dfe019fd586a5dedfa22443b665f07000005eb3014203873bc33760036f300000000007dc0c6b18f7f011fb84b", 0x30}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) tkill(r0, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 16:52:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x19, &(0x7f0000000000)={@private2}, 0x20) 16:52:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x35, &(0x7f0000000000)={@private2}, 0x20) 16:52:40 executing program 3: io_setup(0x6, &(0x7f0000000080)=0x0) io_getevents(r0, 0x6, 0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], &(0x7f00000001c0)={0x0, 0x989680}) [ 449.841113] ptrace attach of "/root/syz-executor.3"[18168] was attempted by "/root/syz-executor.3"[18169] 16:52:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x2, &(0x7f0000000080)=@raw=[@map], &(0x7f00000000c0)='GPL\x00', 0x2, 0xf8, &(0x7f0000000100)=""/248, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 16:52:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x2, 0x0, 0x300) 16:52:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x8, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 16:52:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf8}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x285f, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000780)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0}]) 16:52:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x80000000, 0x0, 0x2}, 0x20) 16:52:43 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x10) 16:52:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000040)=""/179, 0x32, 0xb3, 0x1}, 0x20) 16:52:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:44 executing program 2: setresuid(0xee01, 0xee00, 0xee01) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x9}, 0xe) 16:52:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x3) 16:52:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x6) 16:52:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x38, 0x0, 0x0) 16:52:44 executing program 0: setresuid(0xee01, 0xee00, 0xee01) r0 = getuid() getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) setresuid(r0, 0xffffffffffffffff, r1) 16:52:44 executing program 3: socketpair(0x0, 0xab9f61ef11c51a11, 0x0, 0x0) 16:52:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf8}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x4, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0xc) 16:52:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @dev, 0x8}, 0x1c, 0x0}, 0x0) 16:52:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001ec0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x0) 16:52:46 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) 16:52:47 executing program 2: bpf$OBJ_GET_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x4000}, 0x10) 16:52:47 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x2c, &(0x7f0000000480)={0xef}, 0x4) 16:52:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x890c, &(0x7f0000000680)={'bond_slave_1\x00', @ifru_ivalue}) 16:52:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x803, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r0, r1, 0x0, 0x4000000000dc) syz_genetlink_get_family_id$smc(0x0) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000003800)={&(0x7f0000003700), 0xc, 0x0, 0x1, 0x0, 0x0, 0x801}, 0x4004800) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, 0x0, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa0028000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 16:52:47 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 16:52:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf8}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:49 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x88, 0xb, 0x0, 0x0) 16:52:49 executing program 3: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf02f6251ce79abca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:52:49 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={0x0, 0x0, 0x18}, 0x10) 16:52:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'macvlan0\x00'}) 16:52:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed59"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:50 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa0190000, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@fat=@quiet='quiet'}], [{@uid_eq={'uid', 0x3d, 0xee01}}]}) 16:52:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x33, 0x0, 0x0) 16:52:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x36, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 16:52:50 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x10, r0, 0x0, 0x0) 16:52:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x280}, 0x40) 16:52:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000040)=""/179, 0x32, 0xb3, 0x1}, 0x20) 16:52:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf8}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x10e, 0x1a, 0x0, 0x0) 16:52:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) 16:52:53 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 16:52:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1d, &(0x7f0000000000)={@private2}, 0x20) 16:52:53 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x3, 0x0, 0x300) 16:52:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @local}}) 16:52:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) 16:52:53 executing program 3: bpf$MAP_CREATE(0x4, &(0x7f0000000200), 0x40) 16:52:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x24, &(0x7f0000000080)={0x0, 0x0}, 0x10) 16:52:53 executing program 5: setresuid(0x0, 0xee00, 0xee01) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:52:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdc, 0xdc, 0x4, [@union={0x0, 0xd, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0xf8}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:56 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x450, 0xffffffff, 0x0, 0x100, 0x0, 0xffffffff, 0xffffffff, 0x380, 0x380, 0x380, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, [], [], 'veth1_to_hsr\x00', 'wlan1\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, [], [], 'wlan1\x00', 'macvtap0\x00'}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@hl={{0x28, 'hl\x00'}}, @common=@mh={{0x28, 'mh\x00'}, {"62af"}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast2}}}, {{@ipv6={@local, @mcast2, [], [], 'veth0_macvtap\x00', 'vcan0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}, @common=@frag={{0x30, 'frag\x00'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b0) 16:52:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xa, &(0x7f0000000080)={0x0, 0x0}, 0x10) 16:52:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x21, 0x0, &(0x7f0000000040)) 16:52:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x21, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0xc) [ 465.080037] x_tables: duplicate underflow at hook 2 16:52:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x8001}, 0x40) 16:52:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x6, 0x0, &(0x7f0000000040)) 16:52:56 executing program 0: keyctl$restrict_keyring(0xe, 0x0, 0x0, 0x0) 16:52:56 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x24, &(0x7f0000000480)={0xef}, 0x4) 16:52:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000006800)=[{{&(0x7f0000000000)=@hci={0x1f, 0x0, 0x4}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[{0x10}], 0x10}}], 0x1, 0x0) 16:52:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x68}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:52:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000680)={'bond_slave_1\x00', @ifru_ivalue}) 16:52:59 executing program 5: r0 = semget$private(0x0, 0x1, 0x0) semctl$SEM_STAT(r0, 0x4, 0x10, 0x0) 16:52:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote}, 0x14) 16:52:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x18, &(0x7f00000011c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 16:52:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 16:52:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000011c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) 16:52:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000001c0)={0x7, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) 16:52:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f00000000c0)={0x9e, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 16:52:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:52:59 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x14, 0x0, 0x0) 16:53:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x68}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:53:02 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000001280)=[@tclass={{0x14, 0x29, 0x3}}], 0x18}, 0x0) 16:53:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000300)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x0) 16:53:02 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, 0x0, &(0x7f0000000240)) 16:53:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x6, 0x19, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0xc) 16:53:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:02 executing program 3: perf_event_open$cgroup(&(0x7f0000000180)={0x8, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:53:02 executing program 0: r0 = add_key$keyring(&(0x7f0000000b40)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0xf, r0, 0x0) 16:53:02 executing program 5: keyctl$unlink(0x7, 0x0, 0x0) 16:53:02 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSBRK(r0, 0x4b63, 0x0) 16:53:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8903, &(0x7f0000000080)={'rose0\x00', @ifru_ivalue}) 16:53:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x2e, 0x0, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSBRK(r0, 0x4b45, 0xfdfdffff) 16:53:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 16:53:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x4, '>bo$'}, &(0x7f0000000180)=0x28) 16:53:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x68}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:53:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000040)) 16:53:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x2e, 0x0, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 16:53:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 16:53:05 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000080)='{\x00') 16:53:05 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000006c0)={'ip6gre0\x00', &(0x7f0000000640)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, 0x700}}) 16:53:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f00000000c0)={0x9e, {{0x29, 0x0, 0x4000000, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 16:53:05 executing program 2: 16:53:05 executing program 0: 16:53:05 executing program 3: 16:53:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000022000001400000014000000020000000200000100000804001b0000007b3cd64d8fb1c2fa2bdedfb1cf2f652f07e240e552009bb4234c3d150194afc3b25cfb337650f7b32201abbce59b73c8a1b14d132f5a0a8ed9f67c7de5084ca84c5304ed17b7ccd073449041e36b166dc2d490a370e0a8ae14f0118e22a04059d7eceb26d9b2bbde3f05f56ce627db8e0075a0db2dd798d0c780862e2e3c444566371a29fa160697d4e33f0a6c36889a47fece3731976d28cf509c0a882b53eafd3d0e518836ba85fcaf072add1491037fd240dc1ebe8a47a1bbcfa3ce861520fc94c66b3e4b60dc671bc4770800000000000000838c242abef25881b37830f9452ac628778d943aed3648777d9d0c6e2b52982c04f24ecf16a183b2be948db2833fa889976b904a0a2095a9e7bc3e7f0e5dddb504fa99c20722a6a94bc67e967e957bc64bd644dcffd3276f806fcb84b135874afcefa6c37ba2d85a3f0be7ed5919c8aa4600"], 0x0, 0x2e, 0x0, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:08 executing program 5: 16:53:08 executing program 0: 16:53:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x4, [@union={0x0, 0xc, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x104}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:53:08 executing program 3: 16:53:08 executing program 2: 16:53:08 executing program 0: 16:53:08 executing program 5: 16:53:08 executing program 3: 16:53:08 executing program 2: 16:53:08 executing program 0: 16:53:08 executing program 3: 16:53:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:08 executing program 5: 16:53:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x4, [@union={0x0, 0xc, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x104}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:53:11 executing program 0: 16:53:11 executing program 2: 16:53:11 executing program 3: 16:53:11 executing program 5: 16:53:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:11 executing program 5: 16:53:11 executing program 0: 16:53:11 executing program 2: 16:53:11 executing program 3: 16:53:11 executing program 5: 16:53:11 executing program 2: 16:53:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x4, [@union={0x0, 0xc, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x104}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:53:14 executing program 0: 16:53:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:14 executing program 3: 16:53:14 executing program 2: 16:53:14 executing program 5: 16:53:14 executing program 5: 16:53:14 executing program 2: 16:53:14 executing program 3: 16:53:14 executing program 0: 16:53:14 executing program 5: 16:53:14 executing program 3: 16:53:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x4, [@union={0x0, 0xc, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x104}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:53:17 executing program 0: 16:53:17 executing program 2: 16:53:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:17 executing program 3: 16:53:17 executing program 5: 16:53:17 executing program 0: 16:53:17 executing program 2: 16:53:17 executing program 3: 16:53:17 executing program 5: 16:53:17 executing program 2: 16:53:17 executing program 0: 16:53:20 executing program 3: 16:53:20 executing program 2: 16:53:20 executing program 5: 16:53:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x4, [@union={0x0, 0xc, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @array, @array, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, 0x0, 0x104}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:53:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) 16:53:20 executing program 0: 16:53:20 executing program 3: 16:53:20 executing program 5: 16:53:20 executing program 0: 16:53:20 executing program 2: 16:53:20 executing program 3: 16:53:20 executing program 5: 16:53:20 executing program 0: 16:53:21 executing program 2: 16:53:21 executing program 3: 16:53:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)="2e0000001a008102e00f80ecdb4cb9020a000004a1dc5f09850569556a6c3255200e000200810040fb1200010004", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100022b2c25e994efd18498d66205baa68754a3f5ffffff020000000000000000000000000021000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x0, 0x1}, 0xfffffffffffffe6c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/219, 0x2e, 0xdb, 0x8}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r3}) [ 492.055170] ================================================================================