LERROR(r1, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES64=0x0]], 0x21) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000500)="62289d841c5578d9f87893a004c7fb34c2a8d527710811bed8bf3bda927c50de4ece284b359d33388f54665ce6f8d22184861d64bcf1711240bc1d4fc6277b7f39cd37eb6595b9161aa571138dc710f79b4ec74fcedc1ff2eb3f58b9f25261437a11f26d642740b80b0bdcdbfa4f3c77be48361d1aec0ad9586e0eec03342b8e2b5cba7e8f11228a30e4f03eac07ae1a5562b38b8938b77cf0d0b08b", 0x9c}], 0x1) write$P9_RWSTAT(r1, &(0x7f00000004c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000280)={0x8000, 0x100000001}) ioctl$TIOCSTI(r1, 0x5412, 0x1) write$selinux_validatetrans(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="737973741fc8c39e9b85421ca95758f380a5051c939e38753a6f626a65637440723a63726f6e645f696e697472635f657865635f743a73302073797374656d5f753a6f626a6563745f723a64656661756c745f636f6e746530303030303030303030303030303030333332372073797374656d5f753a7379737465b08d57a406e365109f1d910000000000000000"], 0x8e) unshare(0x40000000) fdatasync(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 20:27:53 executing program 5: connect(0xffffffffffffffff, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0x4, @empty, 0x4}, 0x80) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x0, 0xb90, @loopback, 0x6}, {0xa, 0x4e21, 0x9, @local}, 0x600000000000000, [0x3, 0x9, 0x7, 0x6, 0x10000, 0x228, 0x3, 0x207]}, 0x5c) inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x802, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000027) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setns(r2, 0x20000000) fcntl$addseals(r3, 0x409, 0x1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x40000) write$P9_RLERROR(r1, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES64=0x0]], 0x21) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000500)="62289d841c5578d9f87893a004c7fb34c2a8d527710811bed8bf3bda927c50de4ece284b359d33388f54665ce6f8d22184861d64bcf1711240bc1d4fc6277b7f39cd37eb6595b9161aa571138dc710f79b4ec74fcedc1ff2eb3f58b9f25261437a11f26d642740b80b0bdcdbfa4f3c77be48361d1aec0ad9586e0eec03342b8e2b5cba7e8f11228a30e4f03eac07ae1a5562b38b8938b77cf0d0b08b", 0x9c}], 0x1) write$P9_RWSTAT(r1, &(0x7f00000004c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000280)={0x8000, 0x100000001}) ioctl$TIOCSTI(r1, 0x5412, 0x1) write$selinux_validatetrans(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="737973741fc8c39e9b85421ca95758f380a5051c939e38753a6f626a65637440723a63726f6e645f696e697472635f657865635f743a73302073797374656d5f753a6f626a6563745f723a64656661756c745f636f6e746530303030303030303030303030303030333332372073797374656d5f753a7379737465b08d57a406e365109f1d910000000000000000"], 0x8e) unshare(0x40000000) fdatasync(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 20:27:53 executing program 2: connect(0xffffffffffffffff, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0x4, @empty, 0x4}, 0x80) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x0, 0xb90, @loopback, 0x6}, {0xa, 0x4e21, 0x9, @local}, 0x600000000000000, [0x3, 0x9, 0x7, 0x6, 0x10000, 0x228, 0x3, 0x207]}, 0x5c) inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x802, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000027) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setns(r2, 0x20000000) fcntl$addseals(r3, 0x409, 0x1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x40000) write$P9_RLERROR(r1, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES64=0x0]], 0x21) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000500)="62289d841c5578d9f87893a004c7fb34c2a8d527710811bed8bf3bda927c50de4ece284b359d33388f54665ce6f8d22184861d64bcf1711240bc1d4fc6277b7f39cd37eb6595b9161aa571138dc710f79b4ec74fcedc1ff2eb3f58b9f25261437a11f26d642740b80b0bdcdbfa4f3c77be48361d1aec0ad9586e0eec03342b8e2b5cba7e8f11228a30e4f03eac07ae1a5562b38b8938b77cf0d0b08b", 0x9c}], 0x1) write$P9_RWSTAT(r1, &(0x7f00000004c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000280)={0x8000, 0x100000001}) ioctl$TIOCSTI(r1, 0x5412, 0x1) write$selinux_validatetrans(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="737973741fc8c39e9b85421ca95758f380a5051c939e38753a6f626a65637440723a63726f6e645f696e697472635f657865635f743a73302073797374656d5f753a6f626a6563745f723a64656661756c745f636f6e746530303030303030303030303030303030333332372073797374656d5f753a7379737465b08d57a406e365109f1d910000000000000000"], 0x8e) unshare(0x40000000) fdatasync(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 20:27:53 executing program 0: connect(0xffffffffffffffff, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0x4, @empty, 0x4}, 0x80) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x0, 0xb90, @loopback, 0x6}, {0xa, 0x4e21, 0x9, @local}, 0x600000000000000, [0x3, 0x9, 0x7, 0x6, 0x10000, 0x228, 0x3, 0x207]}, 0x5c) inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x802, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000027) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setns(r2, 0x20000000) fcntl$addseals(r3, 0x409, 0x1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x40000) write$P9_RLERROR(r1, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES64=0x0]], 0x21) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000500)="62289d841c5578d9f87893a004c7fb34c2a8d527710811bed8bf3bda927c50de4ece284b359d33388f54665ce6f8d22184861d64bcf1711240bc1d4fc6277b7f39cd37eb6595b9161aa571138dc710f79b4ec74fcedc1ff2eb3f58b9f25261437a11f26d642740b80b0bdcdbfa4f3c77be48361d1aec0ad9586e0eec03342b8e2b5cba7e8f11228a30e4f03eac07ae1a5562b38b8938b77cf0d0b08b", 0x9c}], 0x1) write$P9_RWSTAT(r1, &(0x7f00000004c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000280)={0x8000, 0x100000001}) ioctl$TIOCSTI(r1, 0x5412, 0x1) write$selinux_validatetrans(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="737973741fc8c39e9b85421ca95758f380a5051c939e38753a6f626a65637440723a63726f6e645f696e697472635f657865635f743a73302073797374656d5f753a6f626a6563745f723a64656661756c745f636f6e746530303030303030303030303030303030333332372073797374656d5f753a7379737465b08d57a406e365109f1d910000000000000000"], 0x8e) unshare(0x40000000) fdatasync(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 20:27:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x10000800, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000280)={{}, 'syz0\x00'}) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000100)) dup3(r0, r2, 0x0) dup2(r2, r1) [ 407.156117] input: syz0 as /devices/virtual/input/input36 20:27:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x10000800, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000280)={{}, 'syz0\x00'}) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000100)) dup3(r0, r2, 0x0) dup2(r2, r1) 20:27:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x10000800, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000280)={{}, 'syz0\x00'}) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000100)) dup3(r0, r2, 0x0) dup2(r2, r1) [ 407.356527] input: syz0 as /devices/virtual/input/input37 [ 407.364057] input: syz0 as /devices/virtual/input/input38 20:27:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x10000800, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000280)={{}, 'syz0\x00'}) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000100)) dup3(r0, r2, 0x0) dup2(r2, r1) 20:27:53 executing program 1: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x10000800, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000280)={{}, 'syz0\x00'}) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000100)) dup3(r0, r2, 0x0) dup2(r2, r1) [ 407.520692] input: syz0 as /devices/virtual/input/input39 20:27:53 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x800, 0x1}, 0x20) 20:27:53 executing program 3: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x10000800, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000280)={{}, 'syz0\x00'}) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x4231d52d, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000100)) dup3(r0, r2, 0x0) dup2(r2, r1) [ 407.586699] input: syz0 as /devices/virtual/input/input40 20:27:53 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x800, 0x1}, 0x20) [ 407.654854] input: syz0 as /devices/virtual/input/input41 20:27:53 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x800, 0x1}, 0x20) 20:27:53 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x800, 0x1}, 0x20) 20:27:53 executing program 2: connect(0xffffffffffffffff, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0x4, @empty, 0x4}, 0x80) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x0, 0xb90, @loopback, 0x6}, {0xa, 0x4e21, 0x9, @local}, 0x600000000000000, [0x3, 0x9, 0x7, 0x6, 0x10000, 0x228, 0x3, 0x207]}, 0x5c) inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x802, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000027) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setns(r2, 0x20000000) fcntl$addseals(r3, 0x409, 0x1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x40000) write$P9_RLERROR(r1, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES64=0x0]], 0x21) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000500)="62289d841c5578d9f87893a004c7fb34c2a8d527710811bed8bf3bda927c50de4ece284b359d33388f54665ce6f8d22184861d64bcf1711240bc1d4fc6277b7f39cd37eb6595b9161aa571138dc710f79b4ec74fcedc1ff2eb3f58b9f25261437a11f26d642740b80b0bdcdbfa4f3c77be48361d1aec0ad9586e0eec03342b8e2b5cba7e8f11228a30e4f03eac07ae1a5562b38b8938b77cf0d0b08b", 0x9c}], 0x1) write$P9_RWSTAT(r1, &(0x7f00000004c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000280)={0x8000, 0x100000001}) ioctl$TIOCSTI(r1, 0x5412, 0x1) write$selinux_validatetrans(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="737973741fc8c39e9b85421ca95758f380a5051c939e38753a6f626a65637440723a63726f6e645f696e697472635f657865635f743a73302073797374656d5f753a6f626a6563745f723a64656661756c745f636f6e746530303030303030303030303030303030333332372073797374656d5f753a7379737465b08d57a406e365109f1d910000000000000000"], 0x8e) unshare(0x40000000) fdatasync(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 20:27:54 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x200000000000003a) 20:27:54 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x800, 0x1}, 0x20) 20:27:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x1fc, 0x0) 20:27:54 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x800, 0x1}, 0x20) 20:27:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x200000000000003a) 20:27:54 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x1fc, 0x0) 20:27:54 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x200000000000003a) 20:27:54 executing program 2: connect(0xffffffffffffffff, &(0x7f0000000140)=@in6={0xa, 0x4e21, 0x4, @empty, 0x4}, 0x80) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x0, 0xb90, @loopback, 0x6}, {0xa, 0x4e21, 0x9, @local}, 0x600000000000000, [0x3, 0x9, 0x7, 0x6, 0x10000, 0x228, 0x3, 0x207]}, 0x5c) inotify_rm_watch(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x802, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000027) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) setns(r2, 0x20000000) fcntl$addseals(r3, 0x409, 0x1) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x40000) write$P9_RLERROR(r1, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES64=0x0]], 0x21) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000500)="62289d841c5578d9f87893a004c7fb34c2a8d527710811bed8bf3bda927c50de4ece284b359d33388f54665ce6f8d22184861d64bcf1711240bc1d4fc6277b7f39cd37eb6595b9161aa571138dc710f79b4ec74fcedc1ff2eb3f58b9f25261437a11f26d642740b80b0bdcdbfa4f3c77be48361d1aec0ad9586e0eec03342b8e2b5cba7e8f11228a30e4f03eac07ae1a5562b38b8938b77cf0d0b08b", 0x9c}], 0x1) write$P9_RWSTAT(r1, &(0x7f00000004c0)={0x7, 0x7f, 0x2}, 0x7) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000280)={0x8000, 0x100000001}) ioctl$TIOCSTI(r1, 0x5412, 0x1) write$selinux_validatetrans(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="737973741fc8c39e9b85421ca95758f380a5051c939e38753a6f626a65637440723a63726f6e645f696e697472635f657865635f743a73302073797374656d5f753a6f626a6563745f723a64656661756c745f636f6e746530303030303030303030303030303030333332372073797374656d5f753a7379737465b08d57a406e365109f1d910000000000000000"], 0x8e) unshare(0x40000000) fdatasync(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 20:27:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x1fc, 0x0) 20:27:54 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x200000000000003a) 20:27:54 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:54 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:54 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x1fc, 0x0) 20:27:55 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:55 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:55 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:55 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:55 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:55 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:55 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:55 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:56 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:56 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:56 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:56 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:56 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:56 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:57 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:57 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:57 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:57 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:58 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:58 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:58 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:58 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:58 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:58 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:58 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x63}], 0x1000000000000193, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000003f4, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) 20:27:58 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:58 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000240)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000006, @remote}, 0x1c) 20:27:58 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) [ 412.712248] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 412.792845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 20:27:59 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, 0x0, 0x7ff}) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) getegid() r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000380)="ba9b952732cee296b351a50653f7c4f58083df978f225923fea25ca972783045c4dedb41406208c4c5ed6329708f3986e898ce35a613fdbc7a5f7acf4b424f5d5623886dfc91110cf98a14732f227bfd76255f50166a84c393cadb3fb912da469941235b848d0243a6cdda2cf1", 0x6d}], 0x1, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000000)={0x0, 0x2}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x7) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000200)=""/239) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:27:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8001, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 20:27:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x63}], 0x1000000000000193, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000003f4, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) 20:27:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x63}], 0x1000000000000193, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000003f4, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) 20:27:59 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) [ 412.965752] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 20:27:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x63}], 0x1000000000000193, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000003f4, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) 20:27:59 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:27:59 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) [ 413.201587] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 20:27:59 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) [ 413.249979] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 20:27:59 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:27:59 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:27:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x63}], 0x1000000000000193, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000003f4, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) [ 413.384103] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 413.504964] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 413.522269] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 20:27:59 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:27:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x63}], 0x1000000000000193, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000003f4, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) 20:27:59 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:27:59 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:27:59 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:27:59 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) [ 413.772864] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. [ 413.810897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 20:28:00 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400), 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x63}], 0x1000000000000193, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000003f4, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast1}, &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) 20:28:00 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0xa, &(0x7f000000c000)}, 0x10) 20:28:00 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 20:28:00 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0xa, &(0x7f000000c000)}, 0x10) 20:28:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0xa, &(0x7f000000c000)}, 0x10) 20:28:00 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0xa, &(0x7f000000c000)}, 0x10) 20:28:00 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0xa, &(0x7f000000c000)}, 0x10) 20:28:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0xa, &(0x7f000000c000)}, 0x10) 20:28:00 executing program 1: mount(&(0x7f0000000480)=@md0='/dev/md0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='hfsplus\x00', 0x0, 0xfffffffffffffffe) 20:28:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0xa, &(0x7f000000c000)}, 0x10) 20:28:00 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x1}, 0x10021) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 20:28:00 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 20:28:00 executing program 1: mount(&(0x7f0000000480)=@md0='/dev/md0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='hfsplus\x00', 0x0, 0xfffffffffffffffe) 20:28:00 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000580)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@mcast2, @local, @dev={0xfe, 0x80, [], 0x1c}, 0x3f, 0x1ff, 0x40, 0x400, 0x6, 0x80, r1}) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x4c0200, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000500)='bpq0\x00') lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@random={'btrfs.', '\x00'}, &(0x7f0000000480)='procprocuser*GPLselinux(wlan0', 0x1d, 0x2) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) sendmsg$nl_route(r5, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000280)) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000040)={0x5}) ftruncate(r4, 0x80) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) r6 = dup2(0xffffffffffffffff, r4) socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) 20:28:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) 20:28:01 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:01 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x1}, 0x10021) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 20:28:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) 20:28:01 executing program 1: mount(&(0x7f0000000480)=@md0='/dev/md0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='hfsplus\x00', 0x0, 0xfffffffffffffffe) 20:28:01 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 20:28:01 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 20:28:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) 20:28:01 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x1}, 0x10021) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 20:28:01 executing program 1: mount(&(0x7f0000000480)=@md0='/dev/md0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='hfsplus\x00', 0x0, 0xfffffffffffffffe) 20:28:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) 20:28:01 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x1}, 0x10021) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 20:28:01 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:02 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:02 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:02 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:02 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 20:28:02 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 20:28:02 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:02 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6d, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 20:28:02 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:03 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:03 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:03 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:03 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:03 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:03 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:03 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:04 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:04 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:04 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:04 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:04 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:04 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:04 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:04 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:05 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:05 executing program 5: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 5: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 4: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 5: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 4: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 5: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 4: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 5: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:05 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:05 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:05 executing program 5: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:06 executing program 5: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:06 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) timerfd_create(0x7, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x4e22, 0x0, 0x0, 0x80, 0xa0, 0x0, r0, r1}, {0x7}, {0x1}, 0x9}, {{@in=@multicast2}, 0x0, @in6=@ipv4, 0x0, 0x0, 0x3}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0xffffffffffffffff, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 20:28:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:08 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:08 executing program 0: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:08 executing program 0: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:08 executing program 0: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:08 executing program 4: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:08 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:08 executing program 4: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:08 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:08 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:08 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000002000/0x3000)=nil, 0x3000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syncfs(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/net\x00') ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000580)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000700)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) 20:28:09 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 4: readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/102, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) chmod(&(0x7f0000000100)='./file0\x00', 0x124) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf13}) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0xafd1c55377cadbe4}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000acf205000600200000000a00000000000000000500e50000050100001f000000000000250000000000000200010000000000000000020000627c05000500000000a60480000000000000ff0f00000000000000000000000001174000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020a000007000000000000000000000005001a0000080000041727fb967ce73939ca5dbb8ab5b9da000000000000ffffac1414b202000100"], 0x38}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x224, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x154, 0x0) 20:28:09 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 2: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 2: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:09 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 2: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:28:10 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:28:10 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 1: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:28:10 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:28:10 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000800)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7, 0x9, 0x8, 0xd4f0, 0x0, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r2, 0xc, r1, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x7fff, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x3, 0x5e89, 0xfff9) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000003c0)={{0x2, 0x0, @rand_addr}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'nr0\x00'}) 20:28:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:28:10 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:28:10 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 20:28:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000200)='./file0\x00', 0x2) 20:28:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) [ 424.428218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20464 comm=syz-executor5 20:28:10 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:28:10 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000200)='./file0\x00', 0x2) 20:28:10 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 20:28:10 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 20:28:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 20:28:10 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d9"], 0x1) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) [ 424.617589] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20488 comm=syz-executor5 20:28:10 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 20:28:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000200)='./file0\x00', 0x2) 20:28:10 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 20:28:10 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000200)='./file0\x00', 0x2) 20:28:10 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 20:28:10 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000200)='./file0\x00', 0x2) 20:28:11 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 20:28:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) [ 424.863641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20519 comm=syz-executor5 20:28:11 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000200)='./file0\x00', 0x2) 20:28:11 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) [ 424.955179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20530 comm=syz-executor3 20:28:11 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) [ 424.994676] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20534 comm=syz-executor1 20:28:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0xa4) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000340)='./file1\x00', r1, &(0x7f0000000200)='./file0\x00', 0x2) 20:28:11 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) [ 425.077655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20541 comm=syz-executor4 [ 425.093563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20540 comm=syz-executor0 20:28:11 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) [ 425.162316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20551 comm=syz-executor5 [ 425.180272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20555 comm=syz-executor3 20:28:11 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) [ 425.186362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12297 sclass=netlink_route_socket pig=20552 comm=syz-executor1 20:28:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:11 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) [ 425.565064] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) [ 425.591741] SELinux: failed to load policy [ 425.676520] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:11 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) 20:28:11 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:11 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:11 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) [ 425.747358] SELinux: failed to load policy 20:28:11 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f0000000400)="7826bd65e77610a96b17627ac7d8822e59a9bbe8a6db54bdc623fc9bcc411bf7db7438586628ce2f0c857eccfd1acc942d93bf8812f31a5589fc1528da7b879622e5c0d44d383eb7f12e91a7438574c180743623ca7104669cfe4f57edc51a40980e616ffb6860c8de212e5da625988494c3e4514b96cf4ed81507e7d067") r1 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xfffffffffffffff8) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x1}) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r2, r3, &(0x7f00000001c0), 0x80000001) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memor1\x00events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) socketpair$unix(0x1, 0x200002, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, 0xfffffffffffffee2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x5}, 0x2c) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000340)) r7 = socket(0xa, 0x3, 0x1000000000ff) ioctl$TIOCGPTPEER(r4, 0x5441, 0x7fff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x33, @loopback, 0x0, 0x0, 'ovf\x00'}, 0x2c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000002c0)='ip6tnl0\x00', 0x10) sendto$unix(r7, &(0x7f0000000000), 0x5a4, 0x0, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) munlock(&(0x7f0000ded000/0x4000)=nil, 0x4000) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f00000001c0)='ipddp0\x00') ioctl$BLKIOMIN(r4, 0x1278, &(0x7f0000000300)) r8 = fcntl$getown(r6, 0x9) r9 = syz_open_procfs(r8, &(0x7f0000000100)='net/tcp\x00') sendfile(r0, r9, &(0x7f0000000280), 0x80000003) [ 425.828998] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) [ 425.900681] SELinux: failed to load policy 20:28:12 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:12 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) [ 425.934027] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) [ 425.986574] SELinux: failed to load policy 20:28:12 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:12 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:12 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) [ 426.042496] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) [ 426.051474] SELinux: failed to load policy [ 426.056190] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) [ 426.066115] SELinux: failed to load policy [ 426.082155] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) [ 426.109314] SELinux: failed to load policy [ 426.132719] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) [ 426.165468] SELinux: failed to load policy [ 426.199082] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) [ 426.233875] SELinux: failed to load policy [ 426.240684] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:12 executing program 0: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) [ 426.252774] SELinux: failed to load policy 20:28:12 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:12 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:12 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 20:28:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) [ 426.288143] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:12 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) [ 426.364057] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:12 executing program 0: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) [ 426.445994] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:12 executing program 0: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:12 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000300000008a6b5e2e9330000"], 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000480)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2e975afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) [ 426.505685] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:12 executing program 2: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) [ 426.554994] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:12 executing program 5: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:12 executing program 0: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) [ 426.624010] SELinux: policydb table sizes (-491411960,13289) do not match mine (8,7) 20:28:12 executing program 1: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) 20:28:12 executing program 5: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) 20:28:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) 20:28:13 executing program 2: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:13 executing program 1: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:13 executing program 5: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:13 executing program 1: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000290000005f000000000000009500400000000000"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x2b, &(0x7f0000000140)="273d8b06d140465bdbf0e531bbf6", &(0x7f0000000280)=""/43}, 0x28) 20:28:13 executing program 2: write(0xffffffffffffffff, &(0x7f0000000440), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 20:28:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) 20:28:13 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() capset(&(0x7f0000000040)={0x20080522, r0}, &(0x7f0000000100)={0x0, 0x0, 0x89, 0x0, 0x0, 0x1}) 20:28:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='oom_score_adj\x00') write$cgroup_int(r1, &(0x7f0000000080)=0x7fffffff, 0x12) 20:28:13 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() capset(&(0x7f0000000040)={0x20080522, r0}, &(0x7f0000000100)={0x0, 0x0, 0x89, 0x0, 0x0, 0x1}) 20:28:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) 20:28:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) 20:28:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000290000005f000000000000009500400000000000"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x2b, &(0x7f0000000140)="273d8b06d140465bdbf0e531bbf6", &(0x7f0000000280)=""/43}, 0x28) 20:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='oom_score_adj\x00') write$cgroup_int(r1, &(0x7f0000000080)=0x7fffffff, 0x12) 20:28:14 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() capset(&(0x7f0000000040)={0x20080522, r0}, &(0x7f0000000100)={0x0, 0x0, 0x89, 0x0, 0x0, 0x1}) 20:28:14 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() capset(&(0x7f0000000040)={0x20080522, r0}, &(0x7f0000000100)={0x0, 0x0, 0x89, 0x0, 0x0, 0x1}) 20:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='oom_score_adj\x00') write$cgroup_int(r1, &(0x7f0000000080)=0x7fffffff, 0x12) 20:28:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000290000005f000000000000009500400000000000"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x2b, &(0x7f0000000140)="273d8b06d140465bdbf0e531bbf6", &(0x7f0000000280)=""/43}, 0x28) 20:28:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) 20:28:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000290000005f000000000000009500400000000000"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x2b, &(0x7f0000000140)="273d8b06d140465bdbf0e531bbf6", &(0x7f0000000280)=""/43}, 0x28) 20:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='oom_score_adj\x00') write$cgroup_int(r1, &(0x7f0000000080)=0x7fffffff, 0x12) 20:28:14 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x13, 0x80f, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r0, &(0x7f0000000300), 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000400)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x40000000000000, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) 20:28:14 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 20:28:14 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:14 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:14 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:15 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:15 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:15 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:15 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 20:28:15 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:15 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 20:28:15 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:16 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:16 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 20:28:16 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:16 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:16 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:16 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:16 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:16 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:16 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:16 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:17 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:17 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:17 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:17 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 430.983651] sel_write_load: 23 callbacks suppressed [ 430.983687] SELinux: failed to load policy 20:28:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:17 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 431.132936] SELinux: failed to load policy 20:28:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) [ 431.262865] SELinux: failed to load policy 20:28:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) [ 431.392684] SELinux: failed to load policy 20:28:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) [ 431.531694] SELinux: failed to load policy 20:28:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) [ 431.688759] SELinux: failed to load policy 20:28:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) [ 431.847302] SELinux: failed to load policy 20:28:18 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:18 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:18 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 432.513055] SELinux: failed to load policy 20:28:18 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) 20:28:18 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 432.696932] SELinux: failed to load policy 20:28:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8, 'SE Linux', "45006a72250b64d0f8d0"}, 0x1a) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000100)='EPL\x00'}, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000000c0)=@req={0x28, &(0x7f00000002c0)={'team0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000140)}}}) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffe) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r3, 0x0) vmsplice(r1, &(0x7f0000001a00)=[{&(0x7f0000001980)="004f582d796068e0d004b850f71ac9cacbbafdc21a173f04984ef9fbfa9d3dc7936d2fe6d5e4cb4e21dc23a51682be13c238035d7860d18aad4036066ee709b6f07084269341f77b16e753dcbb5a74", 0x4f}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) set_thread_area(&(0x7f0000000600)={0x0, 0x20000800, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) rt_sigpending(&(0x7f0000000280), 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) clone(0x0, &(0x7f0000000400)="feed46f7e43449b4ede22e2c4bf8b11fd4fd223e7569e0d7c38ac611fc62c6873ad90221bedce4f7e846208abe3e643d14c2878eb8d30ab3e8f79259", &(0x7f0000000480), &(0x7f0000000540), &(0x7f0000000640)="f97f1a14809f1259ea41f8d5ed7349bb3dd9df39cba2ec6b4ba58def24fd35bf2d0a5fda4e722a3c4712c3997e6e10fb82bdde24b4091782508f2691") vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)="1275e1ef28f3931c7e7d6d583ab79f99df6c1587754a4e91df8d1412b91c185225e0520f5d5b7b018e0c25fe0e94e0beb012ac5568c41c8a47c0ed47bd05f79b8f87a6358ae330163bcd7b1e9b08f46035733d88e4cfba8d", 0x58}], 0x1, 0x3) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) [ 432.847810] SELinux: failed to load policy 20:28:19 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={[{@fat=@errors_remount='errors=remount-ro'}, {@fat=@check_relaxed='check=relaxed'}, {@dots='dots'}, {@fat=@tz_utc='tz=UTC'}, {@dots='dots'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_type={'subj_type'}}, {@smackfshat={'smackfshat', 0x3d, "2f0000b6973c5b3040aca452ce7b66e9bb8f79499071e53fa8bcc10a15c76343ce2db7bb3e3af7928378b56f2fa951bd691563eb786419b4e25eb5e462cca9eeeb34e7f5fca6ce283637471845e2a1ba505df6ae986106d16f21d8e768559a8dd3ea51c1792b322189c8fc0d5750d19d8bbfb1e649b919fb02bbe204ee8be4e8b7264756fd64119c4fe2af796b76064c3a58fdef6ed0536589a24a2ddbb843b28a9aaefc4ff48599b767549abf0524216bd4b21f5ea56542bd98997014b1b7217b1d65d865505bc536950e750b2c313fe399e667c91d07"}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x3f}}, {@fsname={'fsname', 0x3d, "2f0000b6973c5b3040aca452ce7b66e9bb8f79499071e53fa8bcc10a15c76343ce2db7bb3e3af7928378b56f2fa951bd691563eb786419b4e25eb5e462cca9eeeb34e7f5fca6ce283637471845e2a1ba505df6ae986106d16f21d8e768559a8dd3ea51c1792b322189c8fc0d5750d19d8bbfb1e649b919fb02bbe204ee8be4e8b7264756fd64119c4fe2af796b76064c3a58fdef6ed0536589a24a2ddbb843b28a9aaefc4ff48599b767549abf0524216bd4b21f5ea56542bd98997014b1b7217b1d65d865505bc536950e750b2c313fe399e667c91d07"}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x75, 0x37, 0x31, 0x63, 0x77, 0x0, 0x3b], 0x2d, [0x35, 0x76, 0x33, 0x38], 0x2d, [0x3f, 0x38, 0x76, 0x79], 0x2d, [0x0, 0x3e, 0x33, 0x39], 0x2d, [0x63, 0x36, 0x64, 0x36, 0x64, 0x77, 0x0, 0x34]}}}]}) [ 433.013910] FAT-fs (loop4): Unrecognized mount option "subj_type=" or missing value [ 433.113398] FAT-fs (loop4): Unrecognized mount option "subj_type=" or missing value 20:28:19 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={[{@fat=@errors_remount='errors=remount-ro'}, {@fat=@check_relaxed='check=relaxed'}, {@dots='dots'}, {@fat=@tz_utc='tz=UTC'}, {@dots='dots'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_type={'subj_type'}}, {@smackfshat={'smackfshat', 0x3d, "2f0000b6973c5b3040aca452ce7b66e9bb8f79499071e53fa8bcc10a15c76343ce2db7bb3e3af7928378b56f2fa951bd691563eb786419b4e25eb5e462cca9eeeb34e7f5fca6ce283637471845e2a1ba505df6ae986106d16f21d8e768559a8dd3ea51c1792b322189c8fc0d5750d19d8bbfb1e649b919fb02bbe204ee8be4e8b7264756fd64119c4fe2af796b76064c3a58fdef6ed0536589a24a2ddbb843b28a9aaefc4ff48599b767549abf0524216bd4b21f5ea56542bd98997014b1b7217b1d65d865505bc536950e750b2c313fe399e667c91d07"}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x3f}}, {@fsname={'fsname', 0x3d, "2f0000b6973c5b3040aca452ce7b66e9bb8f79499071e53fa8bcc10a15c76343ce2db7bb3e3af7928378b56f2fa951bd691563eb786419b4e25eb5e462cca9eeeb34e7f5fca6ce283637471845e2a1ba505df6ae986106d16f21d8e768559a8dd3ea51c1792b322189c8fc0d5750d19d8bbfb1e649b919fb02bbe204ee8be4e8b7264756fd64119c4fe2af796b76064c3a58fdef6ed0536589a24a2ddbb843b28a9aaefc4ff48599b767549abf0524216bd4b21f5ea56542bd98997014b1b7217b1d65d865505bc536950e750b2c313fe399e667c91d07"}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x75, 0x37, 0x31, 0x63, 0x77, 0x0, 0x3b], 0x2d, [0x35, 0x76, 0x33, 0x38], 0x2d, [0x3f, 0x38, 0x76, 0x79], 0x2d, [0x0, 0x3e, 0x33, 0x39], 0x2d, [0x63, 0x36, 0x64, 0x36, 0x64, 0x77, 0x0, 0x34]}}}]}) [ 433.336272] FAT-fs (loop4): Unrecognized mount option "subj_type=" or missing value 20:28:19 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={[{@fat=@errors_remount='errors=remount-ro'}, {@fat=@check_relaxed='check=relaxed'}, {@dots='dots'}, {@fat=@tz_utc='tz=UTC'}, {@dots='dots'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_type={'subj_type'}}, {@smackfshat={'smackfshat', 0x3d, "2f0000b6973c5b3040aca452ce7b66e9bb8f79499071e53fa8bcc10a15c76343ce2db7bb3e3af7928378b56f2fa951bd691563eb786419b4e25eb5e462cca9eeeb34e7f5fca6ce283637471845e2a1ba505df6ae986106d16f21d8e768559a8dd3ea51c1792b322189c8fc0d5750d19d8bbfb1e649b919fb02bbe204ee8be4e8b7264756fd64119c4fe2af796b76064c3a58fdef6ed0536589a24a2ddbb843b28a9aaefc4ff48599b767549abf0524216bd4b21f5ea56542bd98997014b1b7217b1d65d865505bc536950e750b2c313fe399e667c91d07"}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x3f}}, {@fsname={'fsname', 0x3d, "2f0000b6973c5b3040aca452ce7b66e9bb8f79499071e53fa8bcc10a15c76343ce2db7bb3e3af7928378b56f2fa951bd691563eb786419b4e25eb5e462cca9eeeb34e7f5fca6ce283637471845e2a1ba505df6ae986106d16f21d8e768559a8dd3ea51c1792b322189c8fc0d5750d19d8bbfb1e649b919fb02bbe204ee8be4e8b7264756fd64119c4fe2af796b76064c3a58fdef6ed0536589a24a2ddbb843b28a9aaefc4ff48599b767549abf0524216bd4b21f5ea56542bd98997014b1b7217b1d65d865505bc536950e750b2c313fe399e667c91d07"}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x75, 0x37, 0x31, 0x63, 0x77, 0x0, 0x3b], 0x2d, [0x35, 0x76, 0x33, 0x38], 0x2d, [0x3f, 0x38, 0x76, 0x79], 0x2d, [0x0, 0x3e, 0x33, 0x39], 0x2d, [0x63, 0x36, 0x64, 0x36, 0x64, 0x77, 0x0, 0x34]}}}]}) [ 433.487612] FAT-fs (loop4): Unrecognized mount option "subj_type=" or missing value 20:28:19 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={[{@fat=@errors_remount='errors=remount-ro'}, {@fat=@check_relaxed='check=relaxed'}, {@dots='dots'}, {@fat=@tz_utc='tz=UTC'}, {@dots='dots'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_type={'subj_type'}}, {@smackfshat={'smackfshat', 0x3d, "2f0000b6973c5b3040aca452ce7b66e9bb8f79499071e53fa8bcc10a15c76343ce2db7bb3e3af7928378b56f2fa951bd691563eb786419b4e25eb5e462cca9eeeb34e7f5fca6ce283637471845e2a1ba505df6ae986106d16f21d8e768559a8dd3ea51c1792b322189c8fc0d5750d19d8bbfb1e649b919fb02bbe204ee8be4e8b7264756fd64119c4fe2af796b76064c3a58fdef6ed0536589a24a2ddbb843b28a9aaefc4ff48599b767549abf0524216bd4b21f5ea56542bd98997014b1b7217b1d65d865505bc536950e750b2c313fe399e667c91d07"}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x3f}}, {@fsname={'fsname', 0x3d, "2f0000b6973c5b3040aca452ce7b66e9bb8f79499071e53fa8bcc10a15c76343ce2db7bb3e3af7928378b56f2fa951bd691563eb786419b4e25eb5e462cca9eeeb34e7f5fca6ce283637471845e2a1ba505df6ae986106d16f21d8e768559a8dd3ea51c1792b322189c8fc0d5750d19d8bbfb1e649b919fb02bbe204ee8be4e8b7264756fd64119c4fe2af796b76064c3a58fdef6ed0536589a24a2ddbb843b28a9aaefc4ff48599b767549abf0524216bd4b21f5ea56542bd98997014b1b7217b1d65d865505bc536950e750b2c313fe399e667c91d07"}}, {@hash='hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x7f, 0x75, 0x37, 0x31, 0x63, 0x77, 0x0, 0x3b], 0x2d, [0x35, 0x76, 0x33, 0x38], 0x2d, [0x3f, 0x38, 0x76, 0x79], 0x2d, [0x0, 0x3e, 0x33, 0x39], 0x2d, [0x63, 0x36, 0x64, 0x36, 0x64, 0x77, 0x0, 0x34]}}}]}) [ 433.662777] FAT-fs (loop4): Unrecognized mount option "subj_type=" or missing value 20:28:20 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:20 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x270}}], 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:28:20 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x0, 0x0) r0 = eventfd2(0x7fff, 0x80801) read$eventfd(r0, &(0x7f0000000140), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 20:28:20 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x270}}], 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:28:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x270}}], 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:28:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x270}}], 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:28:20 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x270}}], 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:28:20 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r0, &(0x7f0000000080)='.\x00', 0x1) 20:28:20 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x270}}], 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:28:20 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r0, &(0x7f0000000080)='.\x00', 0x1) 20:28:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x0, 0x0, 0x270}}], 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 20:28:20 executing program 5: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:21 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:21 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r0, &(0x7f0000000080)='.\x00', 0x1) 20:28:21 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:21 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:21 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:21 executing program 0: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r0, &(0x7f0000000080)='.\x00', 0x1) 20:28:21 executing program 0: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:21 executing program 0: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:21 executing program 0: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:21 executing program 5: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:21 executing program 0: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:21 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:22 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:22 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:22 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:22 executing program 0: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:22 executing program 5: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:22 executing program 4: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:22 executing program 3: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:22 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:22 executing program 2: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x10) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0x1ff}, 0x28, 0x3) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 20:28:23 executing program 0: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:23 executing program 0: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:23 executing program 3: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:23 executing program 1: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:23 executing program 2: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:23 executing program 4: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:23 executing program 3: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:23 executing program 5: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:28:23 executing program 2: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:23 executing program 4: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:23 executing program 1: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:23 executing program 3: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:24 executing program 4: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:24 executing program 2: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 20:28:24 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:24 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:24 executing program 1: socket$unix(0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') r2 = getpgid(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000b40)=0x5) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 438.059809] audit: type=1400 audit(1542054504.251:32): avc: denied { call } for pid=21381 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 20:28:24 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:24 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) [ 438.084564] binder_alloc: 21381: binder_alloc_buf failed to map page at 20001000 in userspace [ 438.084678] binder: 21381:21386 transaction failed 29201/-12, size 0-0 line 3135 [ 438.092393] binder: BINDER_SET_CONTEXT_MGR already set [ 438.092405] binder: 21381:21391 ioctl 40046207 0 returned -16 [ 438.103492] binder_alloc: 21381: binder_alloc_buf, no vma [ 438.103532] binder: 21381:21392 transaction failed 29189/-3, size 0-0 line 3135 [ 438.103686] binder: BINDER_SET_CONTEXT_MGR already set [ 438.103695] binder: 21384:21388 ioctl 40046207 0 returned -16 [ 438.104054] binder: undelivered TRANSACTION_ERROR: 29189 [ 438.104278] binder: undelivered TRANSACTION_ERROR: 29201 [ 438.208017] binder_alloc: 21401: binder_alloc_buf failed to map page at 20001000 in userspace [ 438.208062] binder: 21401:21406 transaction failed 29201/-12, size 0-0 line 3135 [ 438.208727] binder: undelivered TRANSACTION_ERROR: 29201 [ 438.220305] binder: BINDER_SET_CONTEXT_MGR already set [ 438.220316] binder: 21404:21407 ioctl 40046207 0 returned -16 [ 438.221557] binder_alloc: 21401: binder_alloc_buf failed to map pages in userspace, no vma [ 438.221584] binder: 21404:21407 transaction failed 29189/-3, size 0-0 line 3135 [ 438.221955] binder: undelivered TRANSACTION_ERROR: 29189 20:28:24 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:24 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:24 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:24 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:24 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) [ 438.457671] binder_alloc: 21418: binder_alloc_buf failed to map page at 20001000 in userspace [ 438.466175] binder: BINDER_SET_CONTEXT_MGR already set [ 438.466184] binder: 21419:21422 ioctl 40046207 0 returned -16 [ 438.484087] binder: BINDER_SET_CONTEXT_MGR already set [ 438.484096] binder: 21423:21425 ioctl 40046207 0 returned -16 [ 438.488595] binder: BINDER_SET_CONTEXT_MGR already set [ 438.488605] binder: 21424:21426 ioctl 40046207 0 returned -16 [ 438.498185] binder: BINDER_SET_CONTEXT_MGR already set [ 438.498195] binder: 21427:21428 ioctl 40046207 0 returned -16 [ 438.525626] binder: 21418:21420 transaction failed 29201/-12, size 0-0 line 3135 [ 438.525633] binder_alloc: 21418: binder_alloc_buf failed to map page at 20001000 in userspace [ 438.534016] binder_alloc: 21418: binder_alloc_buf failed to map page at 20001000 in userspace [ 438.542247] binder: 21419:21422 transaction failed 29201/-12, size 0-0 line 3135 [ 438.542307] binder_alloc: 21418: binder_alloc_buf failed to map page at 20001000 in userspace [ 438.558444] binder: 21423:21425 transaction failed 29201/-12, size 0-0 line 3135 [ 438.558500] binder: undelivered TRANSACTION_ERROR: 29201 [ 438.568413] binder_alloc: 21418: binder_alloc_buf failed to map page at 20001000 in userspace [ 438.575142] binder: 21424:21426 transaction failed 29201/-12, size 0-0 line 3135 [ 438.583514] binder: undelivered TRANSACTION_ERROR: 29201 20:28:24 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:24 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) [ 438.583744] binder: 21427:21428 transaction failed 29201/-12, size 0-0 line 3135 [ 438.596956] binder: undelivered TRANSACTION_ERROR: 29201 [ 438.597689] binder: undelivered TRANSACTION_ERROR: 29201 [ 438.645788] binder: BINDER_SET_CONTEXT_MGR already set [ 438.669428] binder: 21430:21432 ioctl 40046207 0 returned -16 [ 438.669961] binder: undelivered TRANSACTION_ERROR: 29201 [ 438.675482] binder: BINDER_SET_CONTEXT_MGR already set [ 438.675492] binder: 21433:21434 ioctl 40046207 0 returned -16 [ 438.675793] binder_alloc: 21418: binder_alloc_buf failed to map pages in userspace, no vma [ 438.675821] binder: 21433:21434 transaction failed 29189/-3, size 0-0 line 3135 [ 438.676169] binder: undelivered TRANSACTION_ERROR: 29189 [ 438.708203] binder: 21430:21438 transaction failed 29189/-22, size 0-0 line 3012 [ 438.767026] binder: undelivered TRANSACTION_ERROR: 29189 [ 438.859067] binder: 21384:21400 unknown command 536871424 [ 438.864680] binder: 21384:21400 ioctl c0306201 20008fd0 returned -22 20:28:25 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:25 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:25 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:25 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '>![', 0x44, 0x3c, 0x0, @remote, @empty, {[], @gre}}}}}, &(0x7f00000001c0)) dup3(r1, r0, 0x0) 20:28:25 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) [ 438.906112] binder: 21384:21441 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 438.906119] binder: 21384:21400 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 438.906729] binder: undelivered death notification, 0000000000000000 20:28:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '>![', 0x44, 0x3c, 0x0, @remote, @empty, {[], @gre}}}}}, &(0x7f00000001c0)) dup3(r1, r0, 0x0) [ 438.949580] binder_alloc: 21445: binder_alloc_buf failed to map page at 20001000 in userspace [ 438.955489] binder: BINDER_SET_CONTEXT_MGR already set [ 438.955499] binder: 21444:21446 ioctl 40046207 0 returned -16 [ 438.969275] binder: BINDER_SET_CONTEXT_MGR already set 20:28:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '>![', 0x44, 0x3c, 0x0, @remote, @empty, {[], @gre}}}}}, &(0x7f00000001c0)) dup3(r1, r0, 0x0) [ 438.969285] binder: 21443:21454 ioctl 40046207 0 returned -16 [ 438.972347] binder: BINDER_SET_CONTEXT_MGR already set [ 438.972358] binder: 21449:21455 ioctl 40046207 0 returned -16 [ 438.979609] binder: BINDER_SET_CONTEXT_MGR already set [ 438.979619] binder: 21452:21456 ioctl 40046207 0 returned -16 [ 439.037846] binder_alloc: 21445: binder_alloc_buf failed to map page at 20001000 in userspace 20:28:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '>![', 0x44, 0x3c, 0x0, @remote, @empty, {[], @gre}}}}}, &(0x7f00000001c0)) dup3(r1, r0, 0x0) 20:28:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '>![', 0x44, 0x3c, 0x0, @remote, @empty, {[], @gre}}}}}, &(0x7f00000001c0)) dup3(r1, r0, 0x0) [ 439.047626] binder: 21445:21448 transaction failed 29201/-12, size 0-0 line 3135 [ 439.055490] binder_alloc: 21445: binder_alloc_buf failed to map page at 20001000 in userspace [ 439.064653] binder: 21444:21446 transaction failed 29201/-12, size 0-0 line 3135 20:28:25 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:25 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) [ 439.065703] binder: undelivered TRANSACTION_ERROR: 29201 [ 439.086481] binder: 21452:21456 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 439.086977] binder: undelivered TRANSACTION_ERROR: 29201 [ 439.147432] binder: BINDER_SET_CONTEXT_MGR already set [ 439.147444] binder: 21471:21474 ioctl 40046207 0 returned -16 [ 439.147777] binder: BINDER_SET_CONTEXT_MGR already set [ 439.147787] binder: 21473:21475 ioctl 40046207 0 returned -16 [ 439.184894] binder: 21443:21454 transaction failed 29201/-12, size 0-0 line 3135 [ 439.184900] binder_alloc: 21445: binder_alloc_buf, no vma [ 439.184952] binder: 21449:21455 transaction failed 29189/-3, size 0-0 line 3135 [ 439.185009] binder_alloc: 21445: binder_alloc_buf, no vma [ 439.185038] binder: 21471:21474 transaction failed 29189/-3, size 0-0 line 3135 [ 439.185739] binder: undelivered TRANSACTION_ERROR: 29189 [ 439.193150] binder: undelivered TRANSACTION_ERROR: 29189 [ 439.249956] binder: 21473:21475 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 439.261169] binder: undelivered TRANSACTION_ERROR: 29201 20:28:25 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '>![', 0x44, 0x3c, 0x0, @remote, @empty, {[], @gre}}}}}, &(0x7f00000001c0)) dup3(r1, r0, 0x0) 20:28:25 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:25 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:25 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xb) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)}}], 0x0, 0x0, &(0x7f0000000300)}) 20:28:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000), 0x14) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x7a, &(0x7f0000000040)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '>![', 0x44, 0x3c, 0x0, @remote, @empty, {[], @gre}}}}}, &(0x7f00000001c0)) dup3(r1, r0, 0x0) 20:28:26 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:26 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 439.812859] binder: BINDER_SET_CONTEXT_MGR already set [ 439.821628] binder: 21482:21490 ioctl 40046207 0 returned -16 [ 439.832701] binder: 21482:21490 transaction failed 29189/-22, size 0-0 line 3012 [ 439.843193] binder: undelivered TRANSACTION_ERROR: 29189 20:28:26 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:26 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:26 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:26 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 440.585767] binder: undelivered death notification, 0000000000000000 [ 440.610628] binder: undelivered death notification, 0000000000000000 20:28:26 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 440.637701] binder: undelivered death notification, 0000000000000000 [ 440.657589] binder: BINDER_SET_CONTEXT_MGR already set [ 440.663492] binder: 21514:21518 ioctl 40046207 0 returned -16 [ 440.674919] binder: 21514:21518 Acquire 1 refcount change on invalid ref 0 ret -22 20:28:26 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 440.680188] binder: undelivered death notification, 0000000000000000 [ 440.687528] binder: undelivered death notification, 0000000000000000 [ 440.721661] binder: 21514:21527 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 20:28:26 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 440.759299] binder: undelivered death notification, 0000000000000000 [ 440.825319] binder: 21514:21533 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 440.835166] binder: 21514:21533 BC_DEAD_BINDER_DONE 0000000000000000 not found 20:28:27 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:27 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:27 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 441.448628] binder: undelivered death notification, 0000000000000000 [ 441.456864] binder: undelivered death notification, 0000000000000000 20:28:27 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) 20:28:27 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 441.500230] binder: undelivered death notification, 0000000000000000 [ 441.520691] binder: undelivered death notification, 0000000000000000 [ 441.541293] binder: BINDER_SET_CONTEXT_MGR already set 20:28:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) [ 441.541303] binder: 21538:21547 ioctl 40046207 0 returned -16 [ 441.555656] binder: BINDER_SET_CONTEXT_MGR already set [ 441.555667] binder: 21546:21549 ioctl 40046207 0 returned -16 [ 441.556653] binder: BINDER_SET_CONTEXT_MGR already set [ 441.556663] binder: 21545:21548 ioctl 40046207 0 returned -16 [ 441.591541] binder: undelivered death notification, 0000000000000000 20:28:28 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:28 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 20:28:28 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 442.294366] binder: undelivered death notification, 0000000000000000 [ 442.316425] binder: undelivered death notification, 0000000000000000 20:28:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:28 executing program 4: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) [ 442.352166] binder: undelivered death notification, 0000000000000000 [ 442.380188] binder: undelivered death notification, 0000000000000000 20:28:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:28 executing program 4: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) [ 442.426540] binder: undelivered death notification, 0000000000000000 [ 442.427477] nla_parse: 13 callbacks suppressed [ 442.427487] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 442.443770] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 442.459390] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 442.459989] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 20:28:28 executing program 4: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="1f0000000104ff00fd4354c007110000f305014008000100010023dcffdf0043fd08fde6b1e129911992335615e92f4fb80e3d3119d1399d21f9817b38569a90a7101ddf6ba594438ce2599bc94b818ede80ac5e0bcb3ca5684c8a472aa0092ea13e6cdd28e32aa14e4e64f8e1d954c0a6c2afd9e48812560ce83843f634fb1bb7791e3ea41a86cc6aed281c142484dc2be1dd6d95c24e4d7a20946f66fbe154e84bbabe47354806fdde5e687919a862f525b4cec40c6ecc4e8628aee5d8f01a9a01119facb01069164c3400abba722fcbe89ff80e6a590b053478534fde0df0f3c3aef4ccf5301879cfb748647ec5693035885cb4a2fadbf1b76a36689f0d0c5d9d51cd6267c4d0b1d2fa0d02f0d2c4854f9d331cb317eb380189e663c07e316e5197f0bcbfc4a97391ca", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) 20:28:28 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 442.525641] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 442.530179] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 20:28:28 executing program 4: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) 20:28:28 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 442.614136] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 442.641473] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 20:28:28 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:28 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 442.726639] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 442.763154] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 20:28:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 443.006345] FAT-fs (loop1): bogus number of reserved sectors [ 443.013049] FAT-fs (loop1): Can't find a valid FAT filesystem [ 443.113182] FAT-fs (loop1): bogus number of reserved sectors [ 443.119201] FAT-fs (loop1): Can't find a valid FAT filesystem 20:28:29 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, &(0x7f0000012fc7)}) close(r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000200)="c06279c2dba05ea77d729a111bbb27a6d96d22bb7e0f01673d384c57e4948c84908d9755ba2a05ad6a5c92be5db65f0653d247a856fcd651b4e047a83463fb3b12f7028b7d31b36a"}) dup(r1) poll(&(0x7f0000000140), 0x0, 0x10001) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, &(0x7f0000000340)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0x0, 0xfffffdfd, &(0x7f0000000540)}) [ 443.199404] binder: undelivered death notification, 0000000000000000 20:28:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:29 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:29 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 443.601653] FAT-fs (loop1): bogus number of reserved sectors [ 443.610132] FAT-fs (loop1): Can't find a valid FAT filesystem 20:28:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 443.986676] FAT-fs (loop5): bogus number of reserved sectors [ 443.997616] FAT-fs (loop5): Can't find a valid FAT filesystem 20:28:30 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 444.017445] binder: undelivered death notification, 0000000000000000 20:28:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 444.285081] FAT-fs (loop2): bogus number of reserved sectors [ 444.301263] FAT-fs (loop2): Can't find a valid FAT filesystem 20:28:30 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 444.413167] FAT-fs (loop1): bogus number of reserved sectors [ 444.443043] FAT-fs (loop1): Can't find a valid FAT filesystem [ 444.507590] FAT-fs (loop4): bogus number of reserved sectors [ 444.552811] FAT-fs (loop4): Can't find a valid FAT filesystem [ 444.561933] FAT-fs (loop5): bogus number of reserved sectors 20:28:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 444.561940] FAT-fs (loop5): Can't find a valid FAT filesystem 20:28:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 444.729180] FAT-fs (loop2): bogus number of reserved sectors [ 444.737999] FAT-fs (loop2): Can't find a valid FAT filesystem [ 444.831332] FAT-fs (loop1): bogus number of reserved sectors [ 444.844613] FAT-fs (loop1): Can't find a valid FAT filesystem [ 444.885485] FAT-fs (loop0): bogus number of reserved sectors [ 444.912257] FAT-fs (loop0): Can't find a valid FAT filesystem 20:28:31 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 445.138264] FAT-fs (loop4): bogus number of reserved sectors [ 445.145082] FAT-fs (loop4): Can't find a valid FAT filesystem [ 445.270737] FAT-fs (loop0): bogus number of reserved sectors [ 445.276715] FAT-fs (loop0): Can't find a valid FAT filesystem [ 445.396165] FAT-fs (loop2): bogus number of reserved sectors [ 445.405026] FAT-fs (loop2): Can't find a valid FAT filesystem 20:28:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 445.473326] FAT-fs (loop5): bogus number of reserved sectors [ 445.477091] FAT-fs (loop1): bogus number of reserved sectors [ 445.477097] FAT-fs (loop1): Can't find a valid FAT filesystem [ 445.510371] FAT-fs (loop5): Can't find a valid FAT filesystem 20:28:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:31 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:31 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:32 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 446.103535] FAT-fs (loop3): bogus number of reserved sectors [ 446.109628] FAT-fs (loop3): Can't find a valid FAT filesystem [ 446.124680] FAT-fs (loop0): bogus number of reserved sectors [ 446.124718] FAT-fs (loop0): Can't find a valid FAT filesystem 20:28:32 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 446.127204] FAT-fs (loop2): bogus number of reserved sectors [ 446.127503] FAT-fs (loop2): Can't find a valid FAT filesystem [ 446.133478] FAT-fs (loop4): bogus number of reserved sectors [ 446.133626] FAT-fs (loop4): Can't find a valid FAT filesystem [ 446.136562] FAT-fs (loop1): bogus number of reserved sectors 20:28:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 446.136619] FAT-fs (loop1): Can't find a valid FAT filesystem 20:28:32 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:32 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 446.573664] FAT-fs (loop1): bogus number of reserved sectors [ 446.591974] FAT-fs (loop1): Can't find a valid FAT filesystem [ 446.627295] FAT-fs (loop2): bogus number of reserved sectors [ 446.633548] FAT-fs (loop2): Can't find a valid FAT filesystem 20:28:32 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:32 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) 20:28:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 446.974993] FAT-fs (loop3): bogus number of reserved sectors [ 447.006740] FAT-fs (loop3): Can't find a valid FAT filesystem 20:28:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000180)) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x9) socket$inet6(0xa, 0x80806, 0x7ffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x8003fff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000080)={0x20000300}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x2000000c}) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000780)=ANY=[]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) fstat(0xffffffffffffffff, &(0x7f0000000340)) syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./bus\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB]) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) [ 447.218596] FAT-fs (loop2): bogus number of reserved sectors [ 447.225520] FAT-fs (loop2): Can't find a valid FAT filesystem 20:28:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 447.537915] FAT-fs (loop3): bogus number of reserved sectors [ 447.565515] FAT-fs (loop3): Can't find a valid FAT filesystem 20:28:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 3: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) 20:28:34 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 1: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) 20:28:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 448.740361] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 20:28:35 executing program 3: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) [ 448.748941] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 448.755330] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 448.820826] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 20:28:35 executing program 1: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) [ 448.841372] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. [ 448.855013] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 20:28:35 executing program 3: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) [ 448.912859] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 20:28:35 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) 20:28:35 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000980)=ANY=[]) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001002, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x0, 0x3b063233}, {0xb70}]}, 0x14, 0x2) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2f66696c65322070726f636d643573756d6c6f73797374656d762d29786e6574310a00000000000000000000f46e9612eac2938a6a368ea0d724494cb2d43a99f0a5e2a2ed4cac863751c6c993eb51bae2ef57719fe43f0c055180e8b265b0edd1c77942a2bde7ce56394bf154b567e4edaf4b31d1bb30e48f503bbdf65c8ba85d715231cf29cb3c2bbcbc27fcd5cdeaf9f77795d7a61be44d4ac4cb361ed3f590f706e104cd8210827d8c"], 0xab) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) geteuid() fcntl$setflags(r0, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000a80)) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, &(0x7f0000000b80)={[{@mode={'mode'}}]}) fallocate(r0, 0x30, 0x2, 0x100) getgid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000880)) listxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000780)=""/125, 0x7d) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000a00), 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000680)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000700), &(0x7f0000000440)=0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x1, &(0x7f00000006c0)={[{@mode={'mode', 0x3d, 0x100000001}}]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) socket$nl_generic(0x10, 0x3, 0x10) [ 448.969094] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 448.981802] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 20:28:35 executing program 0: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) 20:28:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:35 executing program 1: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) [ 448.983983] netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. 20:28:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:35 executing program 0: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="1f0000000104ff00fd4354c007110000f305014008000100010023dcffdf0043fd08fde6b1e129911992335615e92f4fb80e3d3119d1399d21f9817b38569a90a7101ddf6ba594438ce2599bc94b818ede80ac5e0bcb3ca5684c8a472aa0092ea13e6cdd28e32aa14e4e64f8e1d954c0a6c2afd9e48812560ce83843f634fb1bb7791e3ea41a86cc6aed281c142484dc2be1dd6d95c24e4d7a20946f66fbe154e84bbabe47354806fdde5e687919a862f525b4cec40c6ecc4e8628aee5d8f01a9a01119facb01069164c3400abba722fcbe89ff80e6a590b053478534fde0df0f3c3aef4ccf5301879cfb748647ec5693035885cb4a2fadbf1b76a36689f0d0c5d9d51cd6267c4d0b1d2fa0d02f0d2c4854f9d331cb317eb380189e663c07e316e5197f0bcbfc4a97391ca", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) 20:28:35 executing program 0: r0 = socket(0x10, 0x2, 0xc) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000005c0)="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", 0x12b) r2 = socket(0x10, 0x2, 0xc) r3 = dup3(r1, r0, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000003c0)=0x2) write(r2, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x80, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={r4, r5, 0xf, 0x3}, 0x10) 20:28:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000100)={0x0, r1+10000000}, &(0x7f0000000140), 0x8) 20:28:38 executing program 2: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x200000002f, 0x4) 20:28:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x200000002f, 0x4) 20:28:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x200000002f, 0x4) 20:28:38 executing program 2: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x200000002f, 0x4) 20:28:38 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000100)={0x0, r1+10000000}, &(0x7f0000000140), 0x8) 20:28:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:38 executing program 2: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:38 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000100)={0x0, r1+10000000}, &(0x7f0000000140), 0x8) 20:28:38 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:39 executing program 2: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000100)={0x0, r1+10000000}, &(0x7f0000000140), 0x8) 20:28:39 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:39 executing program 2: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:39 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xaefb) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x211, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r3) write$selinux_access(0xffffffffffffffff, &(0x7f00000000c0)={'system_u:object_r:syslogd_initrc_exec_t:s0', 0x20, '/sbin/dhclient'}, 0x4f) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000040), 0xfffffffffffffe5c, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 20:28:39 executing program 2: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:39 executing program 0: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:39 executing program 5: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{0x0, r1+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000280)) timerfd_gettime(r0, &(0x7f0000000000)) 20:28:39 executing program 0: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:39 executing program 5: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:39 executing program 2: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:39 executing program 5: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:39 executing program 0: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:39 executing program 2: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 2: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 2: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 2: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 0: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 1: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 5: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 3: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 3: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 1: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 0: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 3: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 1: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:40 executing program 0: perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xaf1f, 0x0, 0x400, 0x0, 0x9a18, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x7f, 0x2, 0x0, 0xc26, 0x5, 0x6, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x81, 0x4c5, 0x100, 0x8, 0xd0, 0x7, 0x8001, 0x0, 0x81, 0x1, @perf_config_ext={0xffffffffe10bd44f}, 0x0, 0x78fc, 0x0, 0x0, 0xe8, 0x80000001}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000001640), &(0x7f0000000400)}, 0x20) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000540)="b2b55b1d48a9a876542ea6647f1de7753b1fcac6262e17d978162bd68c6034b63ac7d246e92f9918b9ae326423e87be6d00bd95f089e569189e2e68bb1cd3634ef45837e215777e12a4a69229f554bba"}, 0x10) getpgid(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000003c0)=0xe8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000100)=""/99}, 0x18) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x800, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000001540)}, 0x10) 20:28:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r2, &(0x7f0000000600)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000500)=""/240, 0xf0}, 0x120) close(r1) close(r2) 20:28:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x100, 0x100000000, 0x804, 0x2, 0x0, &(0x7f0000000080)='teql0\x00', 0x9, 0x2, 0x9b}) unshare(0x400) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000e80)=ANY=[@ANYBLOB], &(0x7f0000000480)=0x1) unlink(&(0x7f00000000c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='/dev/null\x00') setuid(r3) ioctl$TIOCGPTPEER(r1, 0x5441, 0x80000001ff) signalfd(r2, &(0x7f0000000180)={0x80}, 0x8) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000980)) sched_setscheduler(0x0, 0x2, &(0x7f00000009c0)=0x998) getpid() getrandom(&(0x7f0000000040)=""/59, 0xfe63, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) 20:28:41 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x2) 20:28:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000340)={0x1, 0x0, 0x200}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)={0x0, 0x0, 0xbd0000000000, 0x200}) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000b40)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback, [0x2, 0x7000028]}, 0x10) 20:28:41 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x2) 20:28:41 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x17}, 0x2c) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x1b0001}, [@ldst={0x7, 0x1, 0x0, 0x0, 0x7a}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 20:28:41 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x2) 20:28:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x17}, 0x2c) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x1b0001}, [@ldst={0x7, 0x1, 0x0, 0x0, 0x7a}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 20:28:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000340)={0x1, 0x0, 0x200}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)={0x0, 0x0, 0xbd0000000000, 0x200}) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000b40)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback, [0x2, 0x7000028]}, 0x10) 20:28:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x100, 0x100000000, 0x804, 0x2, 0x0, &(0x7f0000000080)='teql0\x00', 0x9, 0x2, 0x9b}) unshare(0x400) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000e80)=ANY=[@ANYBLOB], &(0x7f0000000480)=0x1) unlink(&(0x7f00000000c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='/dev/null\x00') setuid(r3) ioctl$TIOCGPTPEER(r1, 0x5441, 0x80000001ff) signalfd(r2, &(0x7f0000000180)={0x80}, 0x8) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000980)) sched_setscheduler(0x0, 0x2, &(0x7f00000009c0)=0x998) getpid() getrandom(&(0x7f0000000040)=""/59, 0xfe63, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) 20:28:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:41 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x2) 20:28:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x17}, 0x2c) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x1b0001}, [@ldst={0x7, 0x1, 0x0, 0x0, 0x7a}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 20:28:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000340)={0x1, 0x0, 0x200}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)={0x0, 0x0, 0xbd0000000000, 0x200}) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000b40)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback, [0x2, 0x7000028]}, 0x10) 20:28:42 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x17}, 0x2c) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x1b0001}, [@ldst={0x7, 0x1, 0x0, 0x0, 0x7a}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 20:28:42 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000340)={0x1, 0x0, 0x200}, 0xc) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)={0x0, 0x0, 0xbd0000000000, 0x200}) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/ipc\x00') ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000b40)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x0, &(0x7f0000db4ff0)={0x2, 0x0, @loopback, [0x2, 0x7000028]}, 0x10) 20:28:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x100, 0x100000000, 0x804, 0x2, 0x0, &(0x7f0000000080)='teql0\x00', 0x9, 0x2, 0x9b}) unshare(0x400) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000e80)=ANY=[@ANYBLOB], &(0x7f0000000480)=0x1) unlink(&(0x7f00000000c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='/dev/null\x00') setuid(r3) ioctl$TIOCGPTPEER(r1, 0x5441, 0x80000001ff) signalfd(r2, &(0x7f0000000180)={0x80}, 0x8) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000980)) sched_setscheduler(0x0, 0x2, &(0x7f00000009c0)=0x998) getpid() getrandom(&(0x7f0000000040)=""/59, 0xfe63, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) 20:28:42 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:42 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:42 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x100, 0x100000000, 0x804, 0x2, 0x0, &(0x7f0000000080)='teql0\x00', 0x9, 0x2, 0x9b}) unshare(0x400) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000e80)=ANY=[@ANYBLOB], &(0x7f0000000480)=0x1) unlink(&(0x7f00000000c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='/dev/null\x00') setuid(r3) ioctl$TIOCGPTPEER(r1, 0x5441, 0x80000001ff) signalfd(r2, &(0x7f0000000180)={0x80}, 0x8) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000980)) sched_setscheduler(0x0, 0x2, &(0x7f00000009c0)=0x998) getpid() getrandom(&(0x7f0000000040)=""/59, 0xfe63, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x0) 20:28:42 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:43 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:43 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:43 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:43 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:43 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:43 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:44 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:44 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:44 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:44 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:45 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:45 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:45 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:45 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:46 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:46 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:46 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:46 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:47 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:47 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:47 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:47 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:47 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:47 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640)={0x6, 0x7, 0x1000, 0x2, 0x7}, 0x14) connect(r0, &(0x7f0000000500)=@generic={0x9, "0574bb16251ce8eb68b4e1031b01818b639da7be6f3ed327a36fbd7c9c136f40f89e3425d69b65658c486b701ac2c8f1e4f7490949ae73e7ab366f6c5cd22a5918fbefda4ba672f7f0c8c9b330c697c13aa4d59ab033a5fc563c7dc398ba6d4595f9b09e855a5f2171f6e8741fe0877fdb27d1ab021499de9558a6031db8"}, 0x80) syz_read_part_table(0xfffffffffffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)}]) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = open(&(0x7f0000000580)='./file0\x00', 0x0, 0x10) connect$unix(r4, &(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000002640)=""/207, 0xfffffede, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x400002, 0x1) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x2, &(0x7f0000000680)={[{@mode={'mode', 0x3d, 0xef}}, {@mode={'mode', 0x3d, 0x17dee22c}}, {@mode={'mode', 0x3d, 0x40}}], [{@subj_user={'subj_user', 0x3d, "df7070703070726f636e6f6465762f"}}]}) 20:28:47 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) 20:28:47 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000230000002abd7000ffdbdf25009c1a00"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000400)={0x100000001}, 0x8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f00000003c0)) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) readahead(0xffffffffffffffff, 0x2e8400000, 0x4) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000340)={0x4, 0x5, 0xf, 0x3, 0x0, 0x1000000000000, 0x5, 0x3, 0xffffffffffffffff}) r5 = syz_open_pts(0xffffffffffffffff, 0x400) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000180)={0xa9, 0x800, 0x0, 0x80000000, 0x0, 0x1000, 0x6, 0x8, 0x5c33, 0x3, 0x9}) INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes [ 714.710197] INFO: task syz-executor0:22623 blocked for more than 140 seconds. [ 714.717618] Not tainted 4.14.80+ #4 [ 714.722051] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 714.730226] syz-executor0 D29120 22623 1840 0x00000004 [ 714.735848] Call Trace: [ 714.738424] ? __schedule+0x729/0x1ed0 [ 714.742607] ? __sched_text_start+0x8/0x8 [ 714.746760] ? lock_downgrade+0x560/0x560 [ 714.751116] ? lock_acquire+0x10f/0x380 [ 714.755085] ? __mutex_lock+0x1bc/0x1480 [ 714.759209] schedule+0x7f/0x1b0 [ 714.762802] schedule_preempt_disabled+0x13/0x20 [ 714.767545] __mutex_lock+0x521/0x1480 [ 714.771699] ? loop_control_ioctl+0x180/0x310 [ 714.776189] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 714.781876] ? avc_ss_reset+0x100/0x100 [ 714.785841] ? __lock_acquire+0x619/0x4320 [ 714.790245] ? __radix_tree_lookup+0x183/0x220 [ 714.794973] ? loop_control_ioctl+0x180/0x310 [ 714.799453] loop_control_ioctl+0x180/0x310 [ 714.804060] ? loop_probe+0x180/0x180 [ 714.807858] ? loop_probe+0x180/0x180 [ 714.811907] do_vfs_ioctl+0x1a0/0x1030 [ 714.815796] ? ioctl_preallocate+0x1d0/0x1d0 [ 714.820338] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 714.826081] ? register_lock_class+0xe11/0x13d0 [ 714.831141] ? lock_acquire+0x10f/0x380 [ 714.835103] ? check_preemption_disabled+0x34/0x1e0 [ 714.840174] ? check_preemption_disabled+0x2b/0x1e0 [ 714.845183] ? __fget+0x22b/0x3a0 [ 714.848626] ? security_file_ioctl+0x7c/0xb0 [ 714.853086] SyS_ioctl+0x7e/0xb0 [ 714.856439] ? do_vfs_ioctl+0x1030/0x1030 [ 714.860616] do_syscall_64+0x19b/0x4b0 [ 714.864505] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 714.869722] RIP: 0033:0x457569 [ 714.872986] RSP: 002b:00007fc2cb36fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 714.880725] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 714.888038] RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000005 [ 714.895406] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 714.902706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc2cb3706d4 [ 714.909973] R13: 00000000004c0631 R14: 00000000004d0b40 R15: 00000000ffffffff [ 714.917332] INFO: task syz-executor5:22610 blocked for more than 140 seconds. [ 714.924640] Not tainted 4.14.80+ #4 [ 714.928775] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 714.936812] syz-executor5 D28360 22610 1839 0x00000004 [ 714.942473] Call Trace: [ 714.945051] ? __schedule+0x729/0x1ed0 [ 714.948923] ? __sched_text_start+0x8/0x8 [ 714.953382] ? lock_downgrade+0x560/0x560 [ 714.957593] ? lock_acquire+0x10f/0x380 [ 714.962068] ? __mutex_lock+0x1bc/0x1480 [ 714.966128] schedule+0x7f/0x1b0 [ 714.969476] schedule_preempt_disabled+0x13/0x20 [ 714.974628] __mutex_lock+0x521/0x1480 [ 714.978582] ? blkdev_reread_part+0x18/0x30 [ 714.982961] ? swapgs_restore_regs_and_return_to_usermode+0x82/0x87 [ 714.989365] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 714.994872] ? _raw_spin_unlock_irqrestore+0x59/0x70 [ 714.999979] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 715.005142] ? __wake_up_common+0x5a0/0x5a0 [ 715.009467] ? blkdev_reread_part+0x18/0x30 [ 715.013826] blkdev_reread_part+0x18/0x30 [ 715.017975] loop_reread_partitions+0x72/0x80 [ 715.023106] loop_set_status+0xa84/0xf40 [ 715.027194] loop_set_status64+0x8d/0xe0 [ 715.031302] ? loop_set_status_old+0x2d0/0x2d0 [ 715.035894] lo_ioctl+0x3cd/0x17d0 [ 715.039416] ? loop_clr_fd+0xac0/0xac0 [ 715.043461] blkdev_ioctl+0x57d/0x18c0 [ 715.047348] ? blkpg_ioctl+0x920/0x920 [ 715.051275] ? __lock_acquire+0x619/0x4320 [ 715.055516] ? debug_check_no_obj_freed+0x2b2/0x77c [ 715.060590] ? retint_kernel+0x2d/0x2d [ 715.064582] ? trace_hardirqs_on_caller+0x381/0x520 [ 715.069588] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 715.074390] block_ioctl+0xd9/0x120 [ 715.078012] ? blkdev_fallocate+0x3b0/0x3b0 [ 715.082372] do_vfs_ioctl+0x1a0/0x1030 [ 715.086364] ? ioctl_preallocate+0x1d0/0x1d0 [ 715.091384] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 715.097093] ? register_lock_class+0xd94/0x13d0 [ 715.101821] ? lock_acquire+0x10f/0x380 [ 715.105793] ? check_preemption_disabled+0x34/0x1e0 [ 715.110870] ? check_preemption_disabled+0x2b/0x1e0 [ 715.115889] ? __fget+0x22b/0x3a0 [ 715.119327] ? security_file_ioctl+0x7c/0xb0 [ 715.123793] SyS_ioctl+0x7e/0xb0 [ 715.127156] ? do_vfs_ioctl+0x1030/0x1030 [ 715.131351] do_syscall_64+0x19b/0x4b0 [ 715.135284] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.140526] RIP: 0033:0x4573d7 [ 715.143711] RSP: 002b:00007fa5471f7a18 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 715.151465] RAX: ffffffffffffffda RBX: 00007fa5471f86d4 RCX: 00000000004573d7 [ 715.158806] RDX: 00007fa5471f7ab0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 715.166154] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 715.173454] R10: 0000000000000075 R11: 0000000000000202 R12: 00007fa5471f86d4 [ 715.180773] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000001 [ 715.188049] INFO: task syz-executor5:22621 blocked for more than 140 seconds. [ 715.195408] Not tainted 4.14.80+ #4 [ 715.199547] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 715.207553] syz-executor5 D29432 22621 1839 0x00000004 [ 715.213206] Call Trace: [ 715.215905] ? __schedule+0x729/0x1ed0 [ 715.219788] ? __sched_text_start+0x8/0x8 [ 715.224437] ? lock_downgrade+0x560/0x560 [ 715.228570] ? lock_acquire+0x10f/0x380 [ 715.232570] ? __mutex_lock+0x1bc/0x1480 [ 715.236699] schedule+0x7f/0x1b0 [ 715.240108] schedule_preempt_disabled+0x13/0x20 [ 715.244876] __mutex_lock+0x521/0x1480 [ 715.248803] ? lo_ioctl+0x85/0x17d0 [ 715.252503] ? __is_insn_slot_addr+0x112/0x1f0 [ 715.257081] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 715.262583] ? lock_acquire+0x10f/0x380 [ 715.266556] ? __free_insn_slot+0x490/0x490 [ 715.270911] ? check_preemption_disabled+0x34/0x1e0 [ 715.275929] ? avc_has_extended_perms+0x406/0xd50 [ 715.280842] ? avc_has_extended_perms+0xd8/0xd50 [ 715.285600] ? check_preemption_disabled+0x34/0x1e0 [ 715.290663] ? lo_ioctl+0x85/0x17d0 [ 715.294328] lo_ioctl+0x85/0x17d0 [ 715.297873] ? loop_clr_fd+0xac0/0xac0 [ 715.301808] blkdev_ioctl+0x57d/0x18c0 [ 715.305739] ? blkpg_ioctl+0x920/0x920 [ 715.309790] ? __lock_acquire+0x619/0x4320 [ 715.314087] ? debug_check_no_obj_freed+0x2b2/0x77c [ 715.319100] ? lock_downgrade+0x560/0x560 [ 715.323291] ? check_preemption_disabled+0x34/0x1e0 [ 715.328306] ? perf_trace_lock+0x11a/0x4c0 [ 715.332582] ? trace_hardirqs_on_caller+0x381/0x520 [ 715.337596] block_ioctl+0xd9/0x120 [ 715.341258] ? blkdev_fallocate+0x3b0/0x3b0 [ 715.345574] do_vfs_ioctl+0x1a0/0x1030 [ 715.349449] ? ioctl_preallocate+0x1d0/0x1d0 [ 715.354346] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 715.360102] ? register_lock_class+0xd90/0x13d0 [ 715.364762] ? lock_acquire+0x10f/0x380 [ 715.368714] ? check_preemption_disabled+0x34/0x1e0 [ 715.373772] ? check_preemption_disabled+0x2b/0x1e0 [ 715.378791] ? __fget+0x22b/0x3a0 [ 715.382312] ? security_file_ioctl+0x7c/0xb0 [ 715.386723] SyS_ioctl+0x7e/0xb0 [ 715.391013] ? do_vfs_ioctl+0x1030/0x1030 [ 715.395158] do_syscall_64+0x19b/0x4b0 [ 715.399036] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.404279] RIP: 0033:0x4573d7 [ 715.407465] RSP: 002b:00007fa5471d6a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 715.415379] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004573d7 [ 715.422673] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000007 [ 715.429931] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 715.437251] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000006 [ 715.444602] R13: 0000000000000000 R14: 00000000004d8598 R15: 00000000ffffffff [ 715.451937] INFO: task syz-executor1:22611 blocked for more than 140 seconds. [ 715.459215] Not tainted 4.14.80+ #4 [ 715.463397] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 715.471376] syz-executor1 D27672 22611 1841 0x00000004 [ 715.476995] Call Trace: [ 715.479568] ? __schedule+0x729/0x1ed0 [ 715.483975] ? __sched_text_start+0x8/0x8 [ 715.488119] schedule+0x7f/0x1b0 [ 715.491517] schedule_preempt_disabled+0x13/0x20 [ 715.497487] __mutex_lock+0x521/0x1480 [ 715.501420] ? blkdev_reread_part+0x18/0x30 [ 715.505779] ? __wake_up_common_lock+0xd2/0x120 [ 715.510489] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 715.515932] ? mark_held_locks+0xc2/0x130 [ 715.520127] ? _raw_spin_unlock_irqrestore+0x54/0x70 [ 715.525222] ? trace_hardirqs_on_caller+0x381/0x520 [ 715.530273] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 715.535477] ? __wake_up_common+0x5a0/0x5a0 [ 715.539791] ? blkdev_reread_part+0x18/0x30 [ 715.544161] blkdev_reread_part+0x18/0x30 [ 715.548309] loop_reread_partitions+0x72/0x80 [ 715.552849] loop_set_status+0xa84/0xf40 [ 715.556910] loop_set_status64+0x8d/0xe0 [ 715.561316] ? loop_set_status_old+0x2d0/0x2d0 [ 715.565921] lo_ioctl+0x3cd/0x17d0 [ 715.569451] ? loop_clr_fd+0xac0/0xac0 [ 715.573367] blkdev_ioctl+0x57d/0x18c0 [ 715.577250] ? blkpg_ioctl+0x920/0x920 [ 715.581178] ? __lock_acquire+0x619/0x4320 [ 715.585409] ? trace_hardirqs_on_caller+0x381/0x520 [ 715.590565] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 715.595328] ? check_preemption_disabled+0x34/0x1e0 [ 715.600387] ? perf_trace_lock+0x11a/0x4c0 [ 715.604622] block_ioctl+0xd9/0x120 [ 715.608225] ? blkdev_fallocate+0x3b0/0x3b0 [ 715.613095] do_vfs_ioctl+0x1a0/0x1030 [ 715.616975] ? ioctl_preallocate+0x1d0/0x1d0 [ 715.621415] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 715.627124] ? register_lock_class+0xd94/0x13d0 [ 715.631825] ? check_preemption_disabled+0x34/0x1e0 [ 715.636840] ? check_preemption_disabled+0x2b/0x1e0 [ 715.641906] ? __fget+0x22b/0x3a0 [ 715.645388] ? security_file_ioctl+0x7c/0xb0 [ 715.649780] SyS_ioctl+0x7e/0xb0 [ 715.653184] ? do_vfs_ioctl+0x1030/0x1030 [ 715.657336] do_syscall_64+0x19b/0x4b0 [ 715.661265] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.666449] RIP: 0033:0x4573d7 [ 715.669723] RSP: 002b:00007f63d2b27a18 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 715.677485] RAX: ffffffffffffffda RBX: 00007f63d2b286d4 RCX: 00000000004573d7 [ 715.684888] RDX: 00007f63d2b27ab0 RSI: 0000000000004c04 RDI: 0000000000000005 [ 715.692218] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 715.699484] R10: 0000000000000075 R11: 0000000000000202 R12: 00007f63d2b286d4 [ 715.706798] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000001 [ 715.714102] INFO: task syz-executor1:22625 blocked for more than 140 seconds. [ 715.721404] Not tainted 4.14.80+ #4 [ 715.725538] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 715.733537] syz-executor1 D28296 22625 1841 0x00000004 [ 715.739165] Call Trace: [ 715.742205] ? __schedule+0x729/0x1ed0 [ 715.746106] ? __sched_text_start+0x8/0x8 [ 715.750279] ? lock_downgrade+0x560/0x560 [ 715.754427] ? lock_acquire+0x10f/0x380 [ 715.758381] ? __mutex_lock+0x1bc/0x1480 [ 715.762487] schedule+0x7f/0x1b0 [ 715.765853] schedule_preempt_disabled+0x13/0x20 [ 715.770722] __mutex_lock+0x521/0x1480 [ 715.776177] ? __blkdev_get+0xf3/0xe50 [ 715.780118] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 715.785626] ? refcount_inc_not_zero+0x6b/0xb0 [ 715.790257] ? get_disk+0xd0/0xd0 [ 715.793702] ? blkdev_ioctl+0x18c0/0x18c0 [ 715.797826] ? exact_match+0x9/0x20 [ 715.801491] ? get_disk+0xd0/0xd0 [ 715.804937] ? kobj_lookup+0x335/0x420 [ 715.808823] ? __blkdev_get+0xf3/0xe50 [ 715.812863] __blkdev_get+0xf3/0xe50 [ 715.816584] ? __blkdev_put+0x6e0/0x6e0 [ 715.820599] ? fsnotify+0x773/0x1200 [ 715.824309] blkdev_get+0x97/0x8c0 [ 715.827833] ? bd_may_claim+0xe0/0xe0 [ 715.831712] ? bd_acquire+0x171/0x2c0 [ 715.835515] ? lock_downgrade+0x560/0x560 [ 715.839648] ? lock_acquire+0x10f/0x380 [ 715.843675] ? bd_acquire+0x21/0x2c0 [ 715.847393] blkdev_open+0x1bd/0x240 [ 715.851190] ? security_file_open+0x88/0x190 [ 715.855624] do_dentry_open+0x426/0xda0 [ 715.859586] ? bd_acquire+0x2c0/0x2c0 [ 715.863449] vfs_open+0x11c/0x210 [ 715.866888] path_openat+0x4eb/0x23a0 [ 715.871091] ? path_mountpoint+0x9a0/0x9a0 [ 715.875325] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 715.879804] ? check_preemption_disabled+0x34/0x1e0 [ 715.884883] ? perf_trace_lock+0x11a/0x4c0 [ 715.889098] ? perf_trace_lock+0x11a/0x4c0 [ 715.893356] ? check_preemption_disabled+0x34/0x1e0 [ 715.898352] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 715.903754] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 715.908676] do_filp_open+0x197/0x270 [ 715.912571] ? may_open_dev+0xd0/0xd0 [ 715.916369] ? _raw_spin_unlock+0x29/0x40 [ 715.920555] do_sys_open+0x2ef/0x580 [ 715.924253] ? filp_open+0x60/0x60 [ 715.927782] ? check_preemption_disabled+0x34/0x1e0 [ 715.932969] ? do_syscall_64+0x43/0x4b0 [ 715.936932] ? do_sys_open+0x580/0x580 [ 715.940901] do_syscall_64+0x19b/0x4b0 [ 715.944780] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.949995] RIP: 0033:0x4111a1 [ 715.953226] RSP: 002b:00007f63d2b06a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 715.960941] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004111a1 [ 715.968200] RDX: 00007f63d2b06afa RSI: 0000000000000002 RDI: 00007f63d2b06af0 [ 715.975488] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 715.982759] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 715.990157] R13: 0000000000000000 R14: 00000000004d8598 R15: 00000000ffffffff [ 715.997432] INFO: task syz-executor2:22616 blocked for more than 140 seconds. [ 716.005069] Not tainted 4.14.80+ #4 [ 716.009198] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 716.017179] syz-executor2 D28808 22616 1844 0x00000004 [ 716.022809] Call Trace: [ 716.025390] ? __schedule+0x729/0x1ed0 [ 716.029274] ? __sched_text_start+0x8/0x8 [ 716.033460] ? lock_downgrade+0x560/0x560 [ 716.037590] ? lock_acquire+0x10f/0x380 [ 716.041578] ? __mutex_lock+0x1bc/0x1480 [ 716.045623] schedule+0x7f/0x1b0 [ 716.048971] schedule_preempt_disabled+0x13/0x20 [ 716.053759] __mutex_lock+0x521/0x1480 [ 716.057636] ? loop_control_ioctl+0x71/0x310 [ 716.062083] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 716.067521] ? avc_ss_reset+0x100/0x100 [ 716.071532] ? __lock_acquire+0x619/0x4320 [ 716.075765] ? loop_control_ioctl+0x71/0x310 [ 716.080200] loop_control_ioctl+0x71/0x310 [ 716.084418] ? loop_probe+0x180/0x180 [ 716.088205] ? loop_probe+0x180/0x180 [ 716.092039] do_vfs_ioctl+0x1a0/0x1030 [ 716.095911] ? ioctl_preallocate+0x1d0/0x1d0 [ 716.100345] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 716.106042] ? register_lock_class+0xe11/0x13d0 [ 716.110741] ? lock_acquire+0x10f/0x380 [ 716.114700] ? check_preemption_disabled+0x34/0x1e0 [ 716.119840] ? check_preemption_disabled+0x2b/0x1e0 [ 716.124896] ? __fget+0x22b/0x3a0 [ 716.128336] ? security_file_ioctl+0x7c/0xb0 [ 716.133117] SyS_ioctl+0x7e/0xb0 [ 716.136476] ? do_vfs_ioctl+0x1030/0x1030 [ 716.140658] do_syscall_64+0x19b/0x4b0 [ 716.144573] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.149745] RIP: 0033:0x457569 [ 716.152968] RSP: 002b:00007fca57f7fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 716.160727] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 716.167983] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000004 [ 716.175322] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 716.182602] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca57f806d4 [ 716.189849] R13: 00000000004c0631 R14: 00000000004d0b40 R15: 00000000ffffffff [ 716.197268] INFO: task syz-executor2:22626 blocked for more than 140 seconds. [ 716.204551] Not tainted 4.14.80+ #4 [ 716.208675] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 716.216667] syz-executor2 D29480 22626 1844 0x00000004 [ 716.222310] Call Trace: [ 716.224888] ? __schedule+0x729/0x1ed0 [ 716.228765] ? __sched_text_start+0x8/0x8 [ 716.232964] ? lock_downgrade+0x560/0x560 [ 716.237098] ? lock_acquire+0x10f/0x380 [ 716.241143] ? __mutex_lock+0x1bc/0x1480 [ 716.245262] schedule+0x7f/0x1b0 [ 716.248664] schedule_preempt_disabled+0x13/0x20 [ 716.253456] __mutex_lock+0x521/0x1480 [ 716.257331] ? loop_control_ioctl+0x71/0x310 [ 716.262106] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 716.267542] ? avc_ss_reset+0x100/0x100 [ 716.271538] ? __lock_acquire+0x619/0x4320 [ 716.275761] ? loop_control_ioctl+0x71/0x310 [ 716.280183] loop_control_ioctl+0x71/0x310 [ 716.284399] ? loop_probe+0x180/0x180 [ 716.288178] ? loop_probe+0x180/0x180 [ 716.291999] do_vfs_ioctl+0x1a0/0x1030 [ 716.295870] ? ioctl_preallocate+0x1d0/0x1d0 [ 716.300293] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 716.306160] ? register_lock_class+0xe12/0x13d0 [ 716.310894] ? lock_acquire+0x10f/0x380 [ 716.314856] ? check_preemption_disabled+0x34/0x1e0 [ 716.319852] ? check_preemption_disabled+0x2b/0x1e0 [ 716.324916] ? __fget+0x22b/0x3a0 [ 716.328354] ? security_file_ioctl+0x7c/0xb0 [ 716.332859] SyS_ioctl+0x7e/0xb0 [ 716.336213] ? do_vfs_ioctl+0x1030/0x1030 [ 716.340391] do_syscall_64+0x19b/0x4b0 [ 716.344267] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.349519] RIP: 0033:0x457569 [ 716.352742] RSP: 002b:00007fca57f5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 716.360501] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457569 [ 716.367755] RDX: 0000000000000000 RSI: 0000000000004c82 RDI: 0000000000000004 [ 716.375043] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 716.382312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca57f5f6d4 [ 716.389558] R13: 00000000004c0619 R14: 00000000004d0b28 R15: 00000000ffffffff [ 716.397187] INFO: task blkid:22612 blocked for more than 140 seconds. [ 716.403791] Not tainted 4.14.80+ #4 [ 716.407913] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 716.415886] blkid D27816 22612 4551 0x00000004 [ 716.421514] Call Trace: [ 716.424088] ? __schedule+0x729/0x1ed0 [ 716.427962] ? __sched_text_start+0x8/0x8 [ 716.432124] ? lock_downgrade+0x560/0x560 [ 716.436251] ? lock_acquire+0x10f/0x380 [ 716.440237] ? __mutex_lock+0x1bc/0x1480 [ 716.444279] schedule+0x7f/0x1b0 [ 716.447623] schedule_preempt_disabled+0x13/0x20 [ 716.452401] __mutex_lock+0x521/0x1480 [ 716.456268] ? __mutex_lock+0x6f4/0x1480 [ 716.460401] ? lo_open+0x17/0xa0 [ 716.463769] ? blkdev_ioctl+0x1800/0x18c0 [ 716.467896] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 716.473367] ? refcount_inc_not_zero+0x6b/0xb0 [ 716.477932] ? get_disk+0xd0/0xd0 [ 716.481503] ? blkdev_ioctl+0x18c0/0x18c0 [ 716.485636] ? exact_match+0x9/0x20 [ 716.489238] ? get_disk+0xd0/0xd0 [ 716.492722] ? kobj_lookup+0x335/0x420 [ 716.496600] ? loop_unregister_transfer+0x90/0x90 [ 716.501463] ? lo_open+0x17/0xa0 [ 716.504807] lo_open+0x17/0xa0 [ 716.507979] __blkdev_get+0x8e2/0xe50 [ 716.511830] ? __blkdev_put+0x6e0/0x6e0 [ 716.515788] ? fsnotify+0x773/0x1200 [ 716.519483] blkdev_get+0x97/0x8c0 [ 716.523359] ? bd_may_claim+0xe0/0xe0 [ 716.527140] ? bd_acquire+0x171/0x2c0 [ 716.530962] ? lock_downgrade+0x560/0x560 [ 716.535151] ? lock_acquire+0x10f/0x380 [ 716.539107] ? bd_acquire+0x21/0x2c0 [ 716.542852] blkdev_open+0x1bd/0x240 [ 716.546546] ? security_file_open+0x88/0x190 [ 716.550981] do_dentry_open+0x426/0xda0 [ 716.554932] ? bd_acquire+0x2c0/0x2c0 [ 716.558717] vfs_open+0x11c/0x210 [ 716.562456] path_openat+0x4eb/0x23a0 [ 716.566248] ? path_mountpoint+0x9a0/0x9a0 [ 716.570587] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 716.575199] ? check_preemption_disabled+0x34/0x1e0 [ 716.580256] ? perf_trace_lock+0x11a/0x4c0 [ 716.584475] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 716.589386] ? new_slab+0x25f/0x470 [ 716.593047] do_filp_open+0x197/0x270 [ 716.596833] ? may_open_dev+0xd0/0xd0 [ 716.600658] ? _raw_spin_unlock+0x29/0x40 [ 716.604792] do_sys_open+0x2ef/0x580 [ 716.608482] ? filp_open+0x60/0x60 [ 716.612035] ? up_read+0x17/0x30 [ 716.615382] ? __do_page_fault+0x64c/0xb60 [ 716.619599] ? do_syscall_64+0x43/0x4b0 [ 716.623601] ? do_sys_open+0x580/0x580 [ 716.627468] do_syscall_64+0x19b/0x4b0 [ 716.631376] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.636544] RIP: 0033:0x7f39d19dc120 [ 716.640300] RSP: 002b:00007ffc37439b08 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 716.647993] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f39d19dc120 [ 716.655601] RDX: 00007ffc3743bf34 RSI: 0000000000000000 RDI: 00007ffc3743bf34 [ 716.662905] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 716.670182] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000007bf030 [ 716.677431] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 716.684813] INFO: task syz-executor3:22619 blocked for more than 140 seconds. [ 716.692092] Not tainted 4.14.80+ #4 [ 716.696215] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 716.704190] syz-executor3 D28712 22619 1842 0x00000004 [ 716.709810] Call Trace: [ 716.712506] ? __schedule+0x729/0x1ed0 [ 716.716389] ? __sched_text_start+0x8/0x8 [ 716.720663] ? lock_downgrade+0x560/0x560 [ 716.724798] ? lock_acquire+0x10f/0x380 [ 716.728765] ? __mutex_lock+0x1bc/0x1480 [ 716.732858] schedule+0x7f/0x1b0 [ 716.736210] schedule_preempt_disabled+0x13/0x20 [ 716.741001] __mutex_lock+0x521/0x1480 [ 716.744872] ? loop_control_ioctl+0x71/0x310 [ 716.749260] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 716.754732] ? avc_ss_reset+0x100/0x100 [ 716.758692] ? __lock_acquire+0x619/0x4320 [ 716.762961] ? loop_control_ioctl+0x71/0x310 [ 716.767377] loop_control_ioctl+0x71/0x310 [ 716.771621] ? loop_probe+0x180/0x180 [ 716.775403] ? loop_probe+0x180/0x180 [ 716.779180] do_vfs_ioctl+0x1a0/0x1030 [ 716.783598] ? ioctl_preallocate+0x1d0/0x1d0 [ 716.787995] ? selinux_parse_skb.constprop.42+0x1a90/0x1a90 [ 716.793728] ? register_lock_class+0xe11/0x13d0 [ 716.798378] ? lock_acquire+0x10f/0x380 [ 716.802384] ? check_preemption_disabled+0x34/0x1e0 [ 716.807452] ? check_preemption_disabled+0x2b/0x1e0 [ 716.812502] ? __fget+0x22b/0x3a0 [ 716.815940] ? security_file_ioctl+0x7c/0xb0 [ 716.820370] SyS_ioctl+0x7e/0xb0 [ 716.823716] ? do_vfs_ioctl+0x1030/0x1030 [ 716.827840] do_syscall_64+0x19b/0x4b0 [ 716.831744] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 716.836918] RIP: 0033:0x457569 [ 716.840139] RSP: 002b:00007f0f8dd8cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 716.847826] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 716.855110] RDX: 0000000000000001 RSI: 0000000000004c81 RDI: 0000000000000005 [ 716.862442] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 716.869695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0f8dd8d6d4 [ 716.876989] R13: 00000000004c0631 R14: 00000000004d0b40 R15: 00000000ffffffff [ 716.884282] INFO: task blkid:22615 blocked for more than 140 seconds. [ 716.890882] Not tainted 4.14.80+ #4 [ 716.895012] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 716.903002] blkid D28504 22615 351 0x00000004 [ 716.908619] Call Trace: [ 716.911565] ? __schedule+0x729/0x1ed0 [ 716.915445] ? __sched_text_start+0x8/0x8 [ 716.919568] ? lock_downgrade+0x560/0x560 [ 716.923790] ? lock_acquire+0x10f/0x380 [ 716.927791] ? __mutex_lock+0x1bc/0x1480 [ 716.931897] schedule+0x7f/0x1b0 [ 716.935262] schedule_preempt_disabled+0x13/0x20 [ 716.940068] __mutex_lock+0x521/0x1480 [ 716.943961] ? lo_open+0x17/0xa0 [ 716.947310] ? blkdev_ioctl+0x1800/0x18c0 [ 716.951496] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 716.956947] ? refcount_inc_not_zero+0x6b/0xb0 [ 716.961582] ? disk_get_part+0x9a/0x140 [ 716.965554] ? refcount_inc_not_zero+0x6b/0xb0 [ 716.970178] ? check_preemption_disabled+0x34/0x1e0 [ 716.975188] ? loop_unregister_transfer+0x90/0x90 [ 716.980059] ? lo_open+0x17/0xa0 [ 716.983417] lo_open+0x17/0xa0 [ 716.986589] __blkdev_get+0x267/0xe50 [ 716.990425] ? __blkdev_put+0x6e0/0x6e0 [ 716.994391] ? fsnotify+0x773/0x1200 [ 716.998087] blkdev_get+0x97/0x8c0 [ 717.001666] ? bd_may_claim+0xe0/0xe0 [ 717.005459] ? bd_acquire+0x171/0x2c0 [ 717.009239] ? lock_downgrade+0x560/0x560 [ 717.013430] ? lock_acquire+0x10f/0x380 [ 717.017412] ? bd_acquire+0x21/0x2c0 [ 717.021179] blkdev_open+0x1bd/0x240 [ 717.024886] ? security_file_open+0x88/0x190 [ 717.029282] do_dentry_open+0x426/0xda0 [ 717.033317] ? bd_acquire+0x2c0/0x2c0 [ 717.037136] vfs_open+0x11c/0x210 [ 717.041092] path_openat+0x4eb/0x23a0 [ 717.044937] ? path_mountpoint+0x9a0/0x9a0 [ 717.049161] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 717.053714] ? check_preemption_disabled+0x34/0x1e0 [ 717.058728] ? perf_trace_lock+0x11a/0x4c0 [ 717.063010] ? perf_trace_lock+0x11a/0x4c0 [ 717.067239] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 717.072227] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 717.077157] do_filp_open+0x197/0x270 [ 717.081001] ? may_open_dev+0xd0/0xd0 [ 717.084804] ? _raw_spin_unlock+0x29/0x40 [ 717.088939] do_sys_open+0x2ef/0x580 [ 717.092702] ? filp_open+0x60/0x60 [ 717.096233] ? up_read+0x17/0x30 [ 717.099579] ? __do_page_fault+0x64c/0xb60 [ 717.103874] ? do_syscall_64+0x43/0x4b0 [ 717.107847] ? do_sys_open+0x580/0x580 [ 717.111767] do_syscall_64+0x19b/0x4b0 [ 717.115653] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 717.120890] RIP: 0033:0x7ffba242f120 [ 717.124592] RSP: 002b:00007fffa8ffcd48 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 717.132346] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffba242f120 [ 717.139613] RDX: 00007fffa8ffdf34 RSI: 0000000000000000 RDI: 00007fffa8ffdf34 [ 717.146946] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 717.154257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000c0d030 [ 717.161557] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 717.168836] [ 717.168836] Showing all locks held in the system: [ 717.175658] 1 lock held by khungtaskd/23: [ 717.179800] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x74/0x20f [ 717.188884] 2 locks held by getty/1765: [ 717.192890] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x20/0x80 [ 717.201854] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1ff/0x15e0 [ 717.211174] 2 locks held by syz-executor0/22623: [ 717.215905] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x71/0x310 [ 717.225045] #1: (&lo->lo_ctl_mutex#2){+.+.}, at: [] loop_control_ioctl+0x180/0x310 [ 717.234538] 2 locks held by syz-executor5/22610: [ 717.239270] #0: (&lo->lo_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x85/0x17d0 [ 717.247904] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x18/0x30 [ 717.256909] 1 lock held by syz-executor5/22621: [ 717.261603] #0: (&lo->lo_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x85/0x17d0 [ 717.270233] 2 locks held by syz-executor1/22611: [ 717.274970] #0: (&lo->lo_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x85/0x17d0 [ 717.283599] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x18/0x30 [ 717.292563] 1 lock held by syz-executor1/22625: [ 717.297207] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0xf3/0xe50 [ 717.305773] 1 lock held by syz-executor2/22616: [ 717.310457] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x71/0x310 [ 717.319571] 1 lock held by syz-executor2/22626: [ 717.324280] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x71/0x310 [ 717.333429] 2 locks held by blkid/22612: [ 717.337474] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0xf3/0xe50 [ 717.346007] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x17/0xa0 [ 717.354116] 1 lock held by syz-executor3/22619: [ 717.358771] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x71/0x310 [ 717.367960] 2 locks held by blkid/22615: [ 717.372043] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0xf3/0xe50 [ 717.380607] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x17/0xa0 [ 717.388683] 1 lock held by syz-executor4/22620: [ 717.393392] #0: (loop_index_mutex){+.+.}, at: [] loop_control_ioctl+0x71/0x310 [ 717.402552] 2 locks held by blkid/22624: [ 717.406600] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0xf3/0xe50 [ 717.415151] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x17/0xa0 [ 717.423265] [ 717.424881] ============================================= [ 717.424881] [ 717.432307] NMI backtrace for cpu 0 [ 717.435944] CPU: 0 PID: 23 Comm: khungtaskd Not tainted 4.14.80+ #4 [ 717.442327] Call Trace: [ 717.444897] dump_stack+0xb9/0x11b [ 717.448448] ? irq_force_complete_move.cold.3+0x64/0x64 [ 717.453792] nmi_cpu_backtrace.cold.0+0x47/0x85 [ 717.458444] ? irq_force_complete_move.cold.3+0x64/0x64 [ 717.463787] nmi_trigger_cpumask_backtrace+0x121/0x146 [ 717.469059] watchdog+0x574/0xa70 [ 717.472495] ? reset_hung_task_detector+0x10/0x10 [ 717.477315] kthread+0x348/0x420 [ 717.480658] ? kthread_create_on_node+0xe0/0xe0 [ 717.485337] ret_from_fork+0x3a/0x50 [ 717.489118] Sending NMI from CPU 0 to CPUs 1: [ 717.493709] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffffaf863d92 [ 717.494665] Kernel panic - not syncing: hung_task: blocked tasks [ 717.494673] CPU: 0 PID: 23 Comm: khungtaskd Not tainted 4.14.80+ #4 [ 717.494676] Call Trace: [ 717.494689] dump_stack+0xb9/0x11b [ 717.494701] panic+0x1bf/0x3a4 [ 717.494709] ? add_taint.cold.4+0x16/0x16 [ 717.494734] watchdog+0x585/0xa70 [ 717.494750] ? reset_hung_task_detector+0x10/0x10 [ 717.494758] kthread+0x348/0x420 [ 717.494766] ? kthread_create_on_node+0xe0/0xe0 [ 717.494777] ret_from_fork+0x3a/0x50 [ 717.547119] Kernel Offset: 0x2d000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 717.558060] Rebooting in 86400 seconds..