NSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:27 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e284"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:27 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:28 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e284"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e284"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:35 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe050000000000"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d365"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe050000000000"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe050000000000"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, 0x0, &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:42 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, 0x0, &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:42 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, 0x0, &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d188"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d188"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, 0x0, &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d188"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, 0x0, &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, 0x0, &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:06:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:01 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:10 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d365"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x0, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x0, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d365"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x0, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:07:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, 0x0, 0x0) 20:07:26 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x0, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x0, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x0, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, 0x0, 0x0) 20:07:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, 0x0, 0x0) 20:07:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:27 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2ab8d183, &(0x7f00000000c0)="0ab6050000001700000000") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) gettid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000002340), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000a40)={0x2, 0x3ffffffffffffffe, @empty}, 0x10) syz_open_dev$evdev(&(0x7f0000002300)='/dev/input/event#\x00', 0x1f, 0x501400) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002440)={0x2, {0x2, 0x4e20}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @broadcast}, 0xe1, 0x8, 0x5, 0x1000, 0x0, 0x0, 0x4}) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000200)) select(0x40, &(0x7f0000002380)={0x40, 0x8, 0x57c0, 0x0, 0x8, 0x1, 0x100000001, 0x5}, &(0x7f00000024c0)={0x2, 0x8, 0x10001, 0x6, 0x401, 0x0, 0xfffffffffffffffb, 0x6}, 0x0, &(0x7f0000002500)={0x77359400}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000180)={0x8001, 0x0, 0x6, 0x0, 0x372}) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) r1 = socket(0xe, 0x5, 0x4c) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/198, 0xc6}, {&(0x7f0000000000)=""/60, 0x3c}, {&(0x7f0000001280)=""/4096, 0x1000}], 0x4, 0x0) write(r1, &(0x7f0000002540)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf", 0x1e) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_matches\x00') preadv(r2, &(0x7f0000000380)=[{&(0x7f0000000140)=""/155, 0x9b}, {&(0x7f00000002c0)=""/157, 0x9d}], 0x2, 0x1000000000000003) 20:07:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x0, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:07:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x0, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) [ 1923.370418] FAT-fs (loop0): codepage cp437 not found 20:07:33 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:07:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x0, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2ab8d183, &(0x7f00000000c0)="0ab6050000001700000000") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4) gettid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000002340), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000a40)={0x2, 0x3ffffffffffffffe, @empty}, 0x10) syz_open_dev$evdev(&(0x7f0000002300)='/dev/input/event#\x00', 0x1f, 0x501400) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002440)={0x2, {0x2, 0x4e20}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @broadcast}, 0xe1, 0x8, 0x5, 0x1000, 0x0, 0x0, 0x4}) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000200)) select(0x40, &(0x7f0000002380)={0x40, 0x8, 0x57c0, 0x0, 0x8, 0x1, 0x100000001, 0x5}, &(0x7f00000024c0)={0x2, 0x8, 0x10001, 0x6, 0x401, 0x0, 0xfffffffffffffffb, 0x6}, 0x0, &(0x7f0000002500)={0x77359400}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000180)={0x8001, 0x0, 0x6, 0x0, 0x372}) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) r1 = socket(0xe, 0x5, 0x4c) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/198, 0xc6}, {&(0x7f0000000000)=""/60, 0x3c}, {&(0x7f0000001280)=""/4096, 0x1000}], 0x4, 0x0) write(r1, &(0x7f0000002540)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf", 0x1e) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_matches\x00') preadv(r2, &(0x7f0000000380)=[{&(0x7f0000000140)=""/155, 0x9b}, {&(0x7f00000002c0)=""/157, 0x9d}], 0x2, 0x1000000000000003) 20:07:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d365"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) [ 1923.629688] FAT-fs (loop0): codepage cp437 not found 20:07:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 0: 20:07:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:33 executing program 0: 20:07:33 executing program 0: 20:07:33 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:07:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 0: 20:07:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:07:40 executing program 0: 20:07:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:07:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 0: 20:07:40 executing program 0: 20:07:40 executing program 0: 20:07:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 0: 20:07:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 0: 20:07:40 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:07:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 0: 20:07:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:07:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 0: 20:07:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:40 executing program 0: 20:07:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:47 executing program 0: 20:07:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:07:47 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:07:47 executing program 0: 20:07:47 executing program 0: 20:07:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {0xffffffffffffffff, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:47 executing program 0: 20:07:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:07:47 executing program 0: 20:07:47 executing program 0: syz_execute_func(&(0x7f00000001c0)="1c3bb5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01eff265dc5f00c35b5b304545e269a841000f9966030faee42c240f54635bdedec4a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 20:07:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:55 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:55 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x1000) fallocate(r1, 0x11, 0x0, 0x107fff) 20:07:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:55 executing program 3: syz_execute_func(&(0x7f0000000080)="1c3bb5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7163853fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01eff265dc5f00c35b5b304545e269a841000f9966030faee42c240f54635bdedec4a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 20:07:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {0xffffffffffffffff, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:07:55 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50000}]}) 20:07:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000100)={@local, @remote}, 0xc) 20:07:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {0xffffffffffffffff, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:55 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:07:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:07:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r2, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r5, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(r1, 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:08:01 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:08:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:01 executing program 3: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000180)="0adc1f12") r0 = open(&(0x7f00000013c0)='./file0\x00', 0x2fc, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:08:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(0x0, 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:24 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:24 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(0x0, 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:24 executing program 2: clock_gettime(0xfffffffffffffffe, &(0x7f0000002300)) 20:08:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendto$inet6(r0, &(0x7f0000000200)="824218b5a5767daae883ecf36e712c2e2e8668779de3338c9c43a0071fb558dbdddda957d1fb6b9f7193d5409d739c5f4f346af5bfa3c04ac811abf2b075405fb2f5448582ef7ba7cc3833cb38c5f1d1713bc6eb038b43f0a3d4a44714491c2849b099d9f33a0863714ba050b0d9003435b74015e903419798", 0x79, 0x4008080, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 20:08:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(0x0, 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) fallocate(r0, 0x11, 0x0, 0x400) 20:08:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x100000000000009) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x0, "f4e8c15e4f17cb25d7e9f42670fa020004588f8366cf124e89e2599a54431affe87b8e05d35b82ea63f05e181e57961752a383a59c7d16875a98505800", "b1a25148d628c66a754caa411658fe6e60703600ad4ce0f1dd6a9390330f4a3fd788b2ead8842baf3892c6065baf604a7e969bed7b4561dafe2a1c6af5fd80dd", "86d2ce4d3e42e5f177be298824d50a789ce382716d8fbc0ee638f4de88bd00"}) 20:08:24 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f00000094c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000009480)=""/32, 0x20}, 0x0) r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x79) sendmmsg(r0, &(0x7f0000003300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000000000008d00000000373d2a"], 0x10}}], 0x1, 0x0) 20:08:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:08:28 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = socket$unix(0x1, 0x1, 0x0) dup3(r1, r3, 0x80000) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r4, 0x0) connect$unix(r3, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) accept4$unix(r4, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) fsetxattr(r1, &(0x7f00000001c0)=@known='user.syz\x00', &(0x7f00000016c0)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x0) 20:08:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:08:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) 20:08:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) 20:08:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:08:28 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) 20:08:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x1000000010027fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000002, 0x0) r1 = gettid() tkill(r1, 0x38) syz_execute_func(&(0x7f00000001c0)="9888c13c710f05450f7791b0254141e2e94180bf108a6796fbc422b19ef40fc4014e66f66d220fa0e5be34d1c4e1f8c48f6840a2b0d5be165e1d22ebd7c421b05ed82eda82f60f0002006eba0dfe8c738866450fc6a1c590000004e201acac1000c4c3214cb9a5605419c201b06e0000eff4f48171a30b8a826ebbbbc4629184a05d600000f046802d010000005a2d960000005b26264788fe00000000dcf340d0f0f042c4e7ae3131b15d30a1c9fb110f9c0f3804830000005d") 20:08:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 20:08:30 executing program 2: bpf$MAP_DELETE_ELEM(0x9, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000180)}, 0x10) 20:08:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x6, 0x0, 0x0) 20:08:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 20:08:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) write(r1, &(0x7f0000000080)="2400000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000bc0000008f3943793a5ea67658cb22d900000000", 0x38) 20:08:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000380)='\xfaIhFlK\x99F\x17Fr>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\x7f\f\x00\x00\x00k\xf1y\xed(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) 20:08:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r0, &(0x7f00000003c0), 0x0}, 0x20) 20:08:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:08:33 executing program 2: r0 = socket(0x10, 0x80002, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, 0x0, 0x0) 20:08:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write(r0, &(0x7f0000001bc0)="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", 0x381) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040)=0xda9, 0x4) socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, &(0x7f00000011c0)="b6924d6783bdd8f7f15d6fdff3960e23dc7488ac0c6d05bfbc86c6914f1df5c68babb4041e676025f3200431cd018204bd8779ba13ad153a37f5c31afb42bf6bda7c8db58a0e9f3e7214844b853e57e6fc9608d852fe85c2d5642ab70f924154708a0ae4bd0bb5c3c526f22d84f3a7b5caf8844bb62b09f5543dc6c31d4176df6d4f124905a6f50d854c8974a6c46a7943ce1d4034f78bef8744b1cde33361d626da96d41c0eaf4e058894708cac94c05e84bebde859a5b5e1", 0xb9, 0x81, 0x0, 0x0) 20:08:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') pread64(r0, &(0x7f0000000040)=""/13, 0xd, 0x0) preadv(r0, &(0x7f0000000cc0)=[{&(0x7f0000000100)=""/89, 0x59}], 0x1, 0x0) 20:08:33 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:08:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x3) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) 20:08:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, 0x0, &(0x7f0000000300)) 20:08:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r0, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r0, &(0x7f0000001040)="c340", 0x2, 0x1, 0x0, 0x0) 20:08:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 20:08:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) 20:08:33 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) gettid() clone(0x3ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) 20:08:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:08:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) close(r0) 20:08:46 executing program 2: r0 = socket(0x40000000010, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 20:08:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:08:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:46 executing program 2: r0 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000004ffc)) 20:08:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) r2 = gettid() ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0)=r2) sendto$inet(r1, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r1, &(0x7f0000000080)='1', 0x1, 0x800000040011, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:08:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:08:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:00 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) sendto$inet(r0, &(0x7f0000000640)="96", 0x1, 0x3fff, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@gettclass={0x24}, 0x24}}, 0x1) 20:09:00 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, 0x0) 20:09:00 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:00 executing program 2: r0 = socket(0x40000000010, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) 20:09:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') mknod(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 20:09:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @remote}, 0x14, {}, 'erspan0\x00'}) 20:09:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) r4 = accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:00 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="1e", 0x1, 0x50, 0x0, 0x0) 20:09:00 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f0000000080)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:09:00 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 20:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast2, 0x0, 0x0, 0x2, 0x100000000000001}, 0x20) 20:09:15 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast2, 0x800, 0x0, 0x2, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2}, 0x20) 20:09:15 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00.\xc9\xe8\xbe\f0\x14\x8c{\xe9\xc3\xea\x18aY\xd1\xbe\x8a\x19\xe7\x00V\xa5\xf3\x92%o\xcb/%\xc6O\xdc\x851\x15}\xd0\x86\x8c`\xd2\xa16V\x10\xbd\x83;\xf4\xe3\xe4\xf9\xc8\x86\x1e\x10\xd4\xf1F\xe6Y\xd5\'t\x8f\fE\xe9\x04\xb6\xb6aGgk\xbaT@\x06\xbe\xbd\xb0\xa4\xeb@9\xb4\xd2_\xa8\xb5\x98\xa8#\xfc\x1f\x8dhU\x05\x91\nY\xa4>|Z\x1a\xc5\a[\x92\x8f6l\xaa\x12i*\xc5\xe0\x115\x90\t\xcb\xfeG\xaa\xc2\xf4\xb3\x9e\xaa\x8f&:\xc5\xea[\xd6\x16\x84@\xeb\xc3}\xd4@\xc9\xa92\xdb\xecU\x1a\x8f\xfe\xb3\xb0U\xaa\xd5\xe0\xcav{2:;{\xb5\xe3\xbf\xf0\xd9\xdc\t\x0f\x8bN5\xd5\xc1\x14\xb7s\xfb\xb4m(\ry\xd1\xe8}\x8av\xc9\xef3\xd2\xe0\xfb\xfc\x15\x81\x18{X\xd3\x0f\x9d[') lseek(r0, 0x0, 0x1) creat(0x0, 0x0) 20:09:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x6) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 20:09:15 executing program 1: 20:09:15 executing program 2: 20:09:15 executing program 2: 20:09:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 1: 20:09:15 executing program 2: 20:09:15 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 1: 20:09:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 2: 20:09:15 executing program 2: 20:09:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 1: 20:09:15 executing program 2: 20:09:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 2: 20:09:15 executing program 1: 20:09:15 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="18100000", @ANYRES32], 0x0, 0x2, 0xa7, &(0x7f00000004c0)=""/167, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:09:15 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:09:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 2: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x400000000000098, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/icmp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 20:09:26 executing program 1: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380), 0x0, 0x0) 20:09:26 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 1: mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) msync(&(0x7f0000dd9000/0x3000)=nil, 0x3000, 0x2) 20:09:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4, 0x40, 0x3f, 0xdf8, 0x0, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x3, 0xb8b, 0x0, 0x0, 0x2, 0x8, 0x49483974, 0x58e8, 0x7ff, 0x0, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0x80000000, 0xa0}, 0xe0b963dc1a7db184, 0x100000001, 0x6, 0x0, 0x80000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5452, 0x2070d000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x8010, 0x2, 0x0, 0x7, 0x7, 0x6, 0xa73, 0x400, 0x101, 0x7, 0x128, 0x9, 0x101, 0x3, 0x0, 0x80000000, 0x7ff, 0xffffffffffffffff, 0x0, 0x5, 0xfffffffffffffffe, 0xa70, 0xdc9, 0x0, 0x80, 0x35c, 0x9c77, 0x0, 0x5, 0xfa3d, 0x0, 0x100, 0x3, @perf_config_ext={0x9750, 0x2}, 0x40, 0x0, 0x0, 0xf, 0x0, 0x8, 0x5}, r2, 0x3, r1, 0x9) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) 20:09:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 1: r0 = socket$inet6(0xa, 0x2000000080803, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) 20:09:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') r1 = timerfd_create(0x0, 0x0) dup2(r0, r1) read(r1, 0x0, 0x0) 20:09:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4, 0x40, 0x3f, 0xdf8, 0x0, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x3, 0xb8b, 0x0, 0x0, 0x2, 0x8, 0x49483974, 0x58e8, 0x7ff, 0x0, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0x80000000, 0xa0}, 0xe0b963dc1a7db184, 0x100000001, 0x6, 0x0, 0x80000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5452, 0x2070d000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x8010, 0x2, 0x0, 0x7, 0x7, 0x6, 0xa73, 0x400, 0x101, 0x7, 0x128, 0x9, 0x101, 0x3, 0x0, 0x80000000, 0x7ff, 0xffffffffffffffff, 0x0, 0x5, 0xfffffffffffffffe, 0xa70, 0xdc9, 0x0, 0x80, 0x35c, 0x9c77, 0x0, 0x5, 0xfa3d, 0x0, 0x100, 0x3, @perf_config_ext={0x9750, 0x2}, 0x40, 0x0, 0x0, 0xf, 0x0, 0x8, 0x5}, r2, 0x3, r1, 0x9) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) 20:09:26 executing program 1: getrandom(0x0, 0x0, 0x0) getcwd(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 20:09:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4, 0x40, 0x3f, 0xdf8, 0x0, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x3, 0xb8b, 0x0, 0x0, 0x2, 0x8, 0x49483974, 0x58e8, 0x7ff, 0x0, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0x80000000, 0xa0}, 0xe0b963dc1a7db184, 0x100000001, 0x6, 0x0, 0x80000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5452, 0x2070d000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x8010, 0x2, 0x0, 0x7, 0x7, 0x6, 0xa73, 0x400, 0x101, 0x7, 0x128, 0x9, 0x101, 0x3, 0x0, 0x80000000, 0x7ff, 0xffffffffffffffff, 0x0, 0x5, 0xfffffffffffffffe, 0xa70, 0xdc9, 0x0, 0x80, 0x35c, 0x9c77, 0x0, 0x5, 0xfa3d, 0x0, 0x100, 0x3, @perf_config_ext={0x9750, 0x2}, 0x40, 0x0, 0x0, 0xf, 0x0, 0x8, 0x5}, r2, 0x3, r1, 0x9) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) 20:09:26 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000a80)={0x0, r1}) 20:09:26 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r0, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r0, 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4, 0x40, 0x3f, 0xdf8, 0x0, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x3, 0xb8b, 0x0, 0x0, 0x2, 0x8, 0x49483974, 0x58e8, 0x7ff, 0x0, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0x80000000, 0xa0}, 0xe0b963dc1a7db184, 0x100000001, 0x6, 0x0, 0x80000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5452, 0x2070d000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x8010, 0x2, 0x0, 0x7, 0x7, 0x6, 0xa73, 0x400, 0x101, 0x7, 0x128, 0x9, 0x101, 0x3, 0x0, 0x80000000, 0x7ff, 0xffffffffffffffff, 0x0, 0x5, 0xfffffffffffffffe, 0xa70, 0xdc9, 0x0, 0x80, 0x35c, 0x9c77, 0x0, 0x5, 0xfa3d, 0x0, 0x100, 0x3, @perf_config_ext={0x9750, 0x2}, 0x40, 0x0, 0x0, 0xf, 0x0, 0x8, 0x5}, r2, 0x3, r1, 0x9) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) 20:09:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:30 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x1f4, 0x0, 0x0, 0x0, 0x8}, 0xfffffd52) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 20:09:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4, 0x40, 0x3f, 0xdf8, 0x0, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x3, 0xb8b, 0x0, 0x0, 0x2, 0x8, 0x49483974, 0x58e8, 0x7ff, 0x0, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0x80000000, 0xa0}, 0xe0b963dc1a7db184, 0x100000001, 0x6, 0x0, 0x80000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5452, 0x2070d000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x8010, 0x2, 0x0, 0x7, 0x7, 0x6, 0xa73, 0x400, 0x101, 0x7, 0x128, 0x9, 0x101, 0x3, 0x0, 0x80000000, 0x7ff, 0xffffffffffffffff, 0x0, 0x5, 0xfffffffffffffffe, 0xa70, 0xdc9, 0x0, 0x80, 0x35c, 0x9c77, 0x0, 0x5, 0xfa3d, 0x0, 0x100, 0x3, @perf_config_ext={0x9750, 0x2}, 0x40, 0x0, 0x0, 0xf, 0x0, 0x8, 0x5}, r2, 0x3, r1, 0x9) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff010000a9bb000001"]) 20:09:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:30 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4, 0x40, 0x3f, 0xdf8, 0x0, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x3, 0xb8b, 0x0, 0x0, 0x2, 0x8, 0x49483974, 0x58e8, 0x7ff, 0x0, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0x80000000, 0xa0}, 0xe0b963dc1a7db184, 0x100000001, 0x6, 0x0, 0x80000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5452, 0x2070d000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0xed, 0x0, 0x0, 0x0, 0x0, 0x8010, 0x2, 0x0, 0x7, 0x7, 0x6, 0xa73, 0x400, 0x101, 0x7, 0x128, 0x9, 0x101, 0x3, 0x0, 0x80000000, 0x7ff, 0xffffffffffffffff, 0x0, 0x5, 0xfffffffffffffffe, 0xa70, 0xdc9, 0x0, 0x80, 0x35c, 0x9c77, 0x0, 0x5, 0xfa3d, 0x0, 0x100, 0x3, @perf_config_ext={0x9750, 0x2}, 0x40, 0x0, 0x0, 0xf, 0x0, 0x8, 0x5}, r2, 0x3, r1, 0x9) 20:09:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4, 0x40, 0x3f, 0xdf8, 0x0, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x3, 0xb8b, 0x0, 0x0, 0x2, 0x8, 0x49483974, 0x58e8, 0x7ff, 0x0, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0x80000000, 0xa0}, 0xe0b963dc1a7db184, 0x100000001, 0x6, 0x0, 0x80000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5452, 0x2070d000) 20:09:30 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2d7) r0 = syz_open_procfs(0x0, &(0x7f0000001300)='maps\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 20:09:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x3, 0x6, 0x0, 0x0, 0x0, 0x1, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4, 0x40, 0x3f, 0xdf8, 0x0, 0x0, 0x1, 0x5, 0xfffffffffffffffc, 0x3, 0xb8b, 0x0, 0x0, 0x2, 0x8, 0x49483974, 0x58e8, 0x7ff, 0x0, 0x6, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x3, @perf_config_ext={0x80000000, 0xa0}, 0xe0b963dc1a7db184, 0x100000001, 0x6, 0x0, 0x80000000, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) 20:09:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) getpid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7ff, 0x368, 0x6, 0x1ff, 0x0, 0x11e, 0x0, 0x0, 0x81, 0x3, 0x10000, 0x0, 0x8, 0x1, 0x100000000, 0x1, 0x8000, 0x1, 0x5, 0x200, 0x800, 0x100000000, 0x7f, 0xffffffffffff8001, 0x3, 0x5, 0x3, 0x6, 0x2, 0x100000000, 0x9, 0x1, 0xffff, 0x0, 0x4, 0x3f, 0x0, 0x7448, 0x0, @perf_config_ext={0x79a, 0x2}, 0x1000, 0x7, 0x6, 0x7, 0x7c0000000000, 0x7}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) 20:09:30 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000300)={@void, @val, @mpls={[], @ipv4={{0x5, 0x4, 0x0, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @loopback}, @udp={0x0, 0x0, 0x5f, 0x0, [], "637f841e0571029de4ab16e7036824223b75e4bacdc9e8f2c4c54f75ca4e926ea2d59a15256f4f06deb922c1c54eeaddd30372fa43fb11263d21d102a505dd595c6d309400462fec6c1a99b4408c695e6f3abca38a6275"}}}}, 0x7d) 20:09:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x9, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) getpid() 20:09:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x7ce}], 0x0, 0x0) 20:09:39 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7144, 0x0, 0x4, 0x0, 0x0, 0x1044, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8f, 0x0, 0x0, 0x2, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) 20:09:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x20010fe, 0x0) 20:09:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 20:09:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x5) 20:09:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 20:09:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000001300)=0x7ff, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xc001, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="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", 0x599, 0x0, 0x0, 0x0) 20:09:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) 20:09:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) 20:09:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) memfd_create(0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x100000001) 20:09:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:40 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) 20:09:40 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f00000069c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 20:09:40 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 20:09:40 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 20:09:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:52 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 20:09:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:52 executing program 1: syz_execute_func(&(0x7f0000000100)="0c0ed52b98cd801b69e429e4e4629b5c5c6200d9d9d0c40f381cd636660f71e0fef9fbe23d0bee8fe9589b26c7e4c753fbc4e101edfcc109098fe840ed8ac61954f6852a2a00c4da7676c7e4f2738f738f08eeeee0000080c4c3dd6d6807485151660fd09500000000509bc4c28d8c1e00d1ea11eff265dc5f4a4e6b6b6b45363ef80f9966030faee4564d24245e5bf447c4c1717473000f10eb0f0d18c401fe5ff68fc978813a64673667667066bd4343660fd2938c0000000f019eacac66458fc8389e8e0400000000c4e2a1a672b8c4e2bd45937c930000") 20:09:52 executing program 2: r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_pwait(r3, 0x0, 0x0, 0x20, &(0x7f0000000640), 0x8) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'nr0\x00', 0xc22}) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) open(0x0, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r7+10000000}, 0x0) tkill(r0, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_OFF(r5, 0x7002) socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x1000000000001fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f00000003c0)="60a95c082cb8a4c2cd24fe4b181df325a0a052a00fd6c762198ebe535123b1ef9d0da28c16bed18e76423befbd42a1d65c40f59792f857fdfcf6a560106297a64abab225ecc1b97cd9d5fac08195f70d46d894de293642674211f5ac4bb1a24af7984d10f3ae087efe44c51f18001b1cdb58f53428c0c020f602eaf8034bc0638e355b4face6c816c84e90c5090c614c1093d35d73e9a3fc2e4660d6de7962bc5b", 0xa1, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000480)={r8, 0x6, 0x9}, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x0, 0x0) 20:09:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:52 executing program 1: r0 = gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={0x0, r1+10000000}, 0x0) tkill(r0, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 20:09:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write(r0, &(0x7f0000001bc0)="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", 0x479) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000011c0)="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", 0x908, 0x81, 0x0, 0x0) 20:09:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000240)="67e46016f7ad290c14dde4f69f890d93e736ef1befeec62c061d35691161334919ababa398b3063393ea73e58b8ffcb0ec90748d4b9f8835caf08f14f0a830ced6f8911510bec0eede41c273981ac943c254b2c7a8d5104a8474d97e9af2468a9eb75a9144781d97555fccec18c21b102c2fe401b71a93ae435fd611241394594e153e1d65ad9cde426c5954ef5bb860b115a46c092f3e367e5bb4a46a837eb21285b085257d64fea42f459dbeaeedcbb03b027b1b019cfb461c18e1383b36e65f68b813f079d25f34c4b0ec19ddf72392", 0xd1, 0x8050, 0x0, 0x0) write(r0, &(0x7f0000001bc0)="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", 0x3dc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) sendto$inet(r0, &(0x7f00000011c0)="b6", 0x1, 0x81, 0x0, 0x0) 20:09:52 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:09:52 executing program 2: 20:09:53 executing program 1: 20:09:53 executing program 2: 20:09:53 executing program 1: INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes 20:10:53 executing program 1: 20:10:53 executing program 2: 20:10:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x7, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:53 executing program 1: 20:10:53 executing program 1: 20:10:53 executing program 2: 20:10:53 executing program 1: 20:10:53 executing program 2: 20:10:53 executing program 2: 20:10:53 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x9, 0x0, &(0x7f00000000c0)) 20:10:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000080)=@random={'security.', 'mime_type$*\x82\x00'}, &(0x7f00000000c0)='mime_type$*\x82\x00', 0xd, 0x0) 20:10:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000001c0)="7f", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r0, &(0x7f0000000e80)="d763ec98de31f5dc47bd7ae5eeceba2e977e432f103b988c19d71150515b1e85734b186237ec9b9430fec0a3117d1440a9c30c12723d46fc4454123028fb5730ac9eb53022e5108d5e6f8fa861b991fcb0123281d4150b0506e8f00c4590b571e43dc126ea669e8e4e2c88f4b8cf4b4540dd7d1bb2981a7fb052afed9c842be23349319c9ef8d893fd656f968ea7e389dc9d942f7a88e123a00f0a215c4281e732e613", 0xa3, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000001240)="7a86d9157e58104a2895fb0ff0e87cfbea49b7f9043de84537fd066a6a786a2e9daaff310fa05111d7550ba8c5d9ed6ab57926b74ba45545163e0354dbc70a278e3eec580d19b52c5f47a56e587491073ebae93f127bb29b3b4e912e523b03f52eeb3a26482a86e514ae6756292144fd84d355d3a396e3e29c68baeee53cf8157d134c7d1e02b74f54cc8a065411cd1c0af87cfb31ab64f42e673953c9852852b5f841d1abd3a516ccf7f40c49328238840f2bd026047bb3a3620df48cec21298b868e58b81c9728cc97de2b91828151dffafb14afad6b8d5083fdfbcaae79b1e3cefc9ab7280d9ceb1f0da8a67a9cd8a01585dad8e5d36a1604477c8eef483a1caea5d4de1a1ad0068f0ae21e6cfb8dfba5295b823c5e8e34e9d2fefb1a70149fa6090e3ab0423c89420c88ddaa2fdb5f0cc53a2968f16309f5d4f7ce226e8a540cc8e073294a12ff07aeea819a0a484f0773e5b26e9d256938cf617910ded31bc9f9e177489f91c282300a8ac13445e2e4ce552d61bb2ae04c45b4a33eec3432e72843bde6a4a1348f841f5d36decd7a2b400e27ead6dcd24a90cafbdcc22828c5241f92b7d6c96ae1cea0eeb28efd267ad036539606b643f780f673994e4f176bc5b9f5711698612967ee6236b2fc6257503937232d9e4afc45c0783b41beaac842b609e2fc1db48d86a454c6b74081cf9f60cd09c95ee19c8dc7bb62c23becf08ae715f9b4316539f15d441f65af326d6067dbb698a31bc11ca678aa7afd6fcfa5467c43227739d2ef25e19dd3919c5f5716e1e4eff73223a0ee251e180d50264c8c27a4c49455daf828c4b3f3f97d2328b4d78f8fd394e4eefc645d8585cf281cf23ec3b9c6ba6448c049f60cc81cd2c3fe1f5f8dd78fc8ed9a83f4f0d2f0e116def57f73927fecf50b8e90a9a1ae599f74e8132cbadf37e4", 0x29b, 0x0, 0x0, 0x0) 20:10:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x7, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 2: syz_read_part_table(0x804, 0x0, 0x0) 20:10:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) write(r1, &(0x7f0000000080)="2400000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:10:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x7, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c9"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:10:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x3}, {}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x7, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:03 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 20:11:03 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 20:11:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x7, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {0xffffffffffffffff, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 20:11:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {0xffffffffffffffff, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:18 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {0xffffffffffffffff, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x7, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 20:11:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r0, 0x0, 0x1}, {r2, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r0, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r0, 0x0, 0x1}, {r2, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r0, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 20:11:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 20:11:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r0, 0x0, 0x1}, {r2, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r0, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r2, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x8, 0x0, 0x0, [{r2, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {r1, 0x0, 0xc6a8}, {}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r2}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d36583"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ffe7dde28e4ed8c3ead100a6a52cd4bf2024d200000000000000008fcb64aa0000006106935810472eef0684086a2c005ff7ae922b5dcf2149a716a189abbf9e998f81d90601f6df2eb433c84b000000000000005ed0f02b9e917c1d1bff9ed8f2897f3424fea04360a3b0f595e7f65f5a3c8ffdaec2c803115193163bb70300b12074574ccd8f441822d2e86797312142d2c961d365"], 0x0, 0x0, 0x80000, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 20:11:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 20:11:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) accept$unix(r1, 0x0, &(0x7f0000000040)) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0x7, 0x0, 0x0, [{r1, 0x0, 0x1}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x3}, {0xffffffffffffffff, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {r1}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r3 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r2, 0x0, 0x3}, {r2, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r3, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 20:11:53 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f12") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x20, 0x0, 0x7f, 0x80000001}, 0x10) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000001c0)=0x40) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0) accept$unix(r1, 0x0, &(0x7f0000000040)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f0000000100)='wlan1\x00', 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x88009, 0x0) fsetxattr$security_smack_transmute(r4, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="000002000000000000006031409200180000fe800000000000000000000000000000ff0200000000000000000000000000010003907800000000fe800000000000000000000000003f1d"], 0x4a) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) 20:11:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001000, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = syz_open_dev$mice(0x0, 0x0, 0x20000) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="fedfa8353fdfa397b8ffd622ea7a8f75bd294fe69237c0efb2385c072b354587c2f843ffffff7fdfed0a6972c26058c47b5b9b38ade2350abd3ff6f4a0d253d85741e496eec4855f35e2840bfaf573009f06b2841dd8210c151172514e02b911e533c84db6780bb20dbe0500000000000000e1b625f9ac89c17096ea02681e4e77d1883c296b52d94b9b7c20c2e40eca58cf69ff"], 0x0, 0x0, 0x80000, 0x0) r4 = accept$unix(r1, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000640)={0x5, 0x3, 0xa, 0x0, 0x0, [{r1, 0x0, 0x1}, {r3, 0x0, 0x3}, {r0, 0x0, 0xc6a8}, {r3, 0x0, 0x3}, {r3, 0x0, 0x1800000000000}, {0xffffffffffffffff, 0x0, 0x1}, {r4, 0x0, 0xffffffffffff0000}, {0xffffffffffffffff, 0x0, 0x2}, {0xffffffffffffffff, 0x0, 0x2400}, {r1, 0x0, 0x9}]}) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3f, &(0x7f00000003c0)=""/4096, &(0x7f0000000300)=0x1000) [ 2436.363209] INFO: task syz-executor.3:14982 blocked for more than 140 seconds. [ 2436.370598] Not tainted 4.9.171+ #49 [ 2436.374877] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2436.382851] syz-executor.3 D25592 14982 1 0x00000004 [ 2436.388584] ffff8801c5fb8000 0000000000000000 ffff8801db621000 ffffffff83031180 [ 2436.396652] ffff8801db621018 ffff8801d2fbf598 ffffffff82801dde ffffffff82e2bc18 [ 2436.404820] ffffffff812080d0 00ffffff83c806d0 ffff8801db6218f0 1ffff1003a5f7ea2 [ 2436.412875] Call Trace: [ 2436.415457] [<000000007c319403>] ? __schedule+0x6ce/0x1f10 [ 2436.421147] [<00000000662d858b>] ? trace_hardirqs_on+0x10/0x10 [ 2436.427228] [<000000005c093f98>] ? io_schedule_timeout+0x390/0x390 [ 2436.433648] [<00000000d891bf6f>] ? mark_held_locks+0xb1/0x100 [ 2436.439611] [<00000000db6b7f33>] schedule+0x92/0x1c0 [ 2436.444847] [<000000005c1ab07b>] schedule_preempt_disabled+0x13/0x20 [ 2436.451483] [<00000000508a3e5c>] mutex_lock_nested+0x38d/0x920 [ 2436.457598] [<000000007f359d0f>] ? fuse_lock_inode+0xad/0xe0 [ 2436.463496] [<000000008dc4f6ce>] ? mutex_trylock+0x3f0/0x3f0 [ 2436.469358] [<000000007bcc6a00>] ? d_alloc_parallel+0x82c/0x1720 [ 2436.475731] [<000000007f359d0f>] fuse_lock_inode+0xad/0xe0 [ 2436.481457] [<0000000003f83b7d>] fuse_lookup+0x89/0x3b0 [ 2436.487067] [<00000000a5fa8d2a>] ? fuse_lookup_name+0x640/0x640 [ 2436.493332] [<00000000a2a10292>] ? __d_lookup_rcu+0x630/0x630 [ 2436.499656] [<00000000a9955f87>] ? lookup_slow+0x160/0x480 [ 2436.505446] [<000000006387abc7>] lookup_slow+0x24b/0x480 [ 2436.511044] [<00000000b1962269>] ? avc_has_perm_noaudit+0x9e/0x300 [ 2436.518648] [<000000008a8735dd>] ? set_root+0x430/0x430 [ 2436.524126] [<00000000521f3a5f>] ? __might_sleep+0x95/0x1a0 [ 2436.530011] [<000000009f5d251d>] ? selinux_inode_permission+0x32d/0x4c0 [ 2436.536956] [<000000001c61c8d1>] ? audit_inode_permission+0x320/0x320 [ 2436.543647] [<000000000c061ac1>] walk_component+0x71e/0xce0 [ 2436.549531] [<00000000e90e0e93>] ? follow_dotdot+0x200/0x200 [ 2436.555651] [<000000001cf011a3>] ? security_inode_permission+0xc5/0x100 [ 2436.562484] [<0000000045364451>] ? fuse_allow_current_process.part.0+0x270/0x270 [ 2436.570134] [<0000000075fd7657>] ? __inode_permission2+0x9e/0x2e0 [ 2436.576553] [<00000000d139193a>] link_path_walk+0x897/0x1200 [ 2436.582427] [<00000000399d74a9>] ? walk_component+0xce0/0xce0 [ 2436.588454] [<000000008c56124e>] ? nd_jump_root+0x1c4/0x3b0 [ 2436.594273] [<00000000a1001f4a>] ? trailing_symlink+0x261/0x790 [ 2436.600420] [<00000000d6f82e9f>] path_mountpoint+0x67/0x6d0 [ 2436.606791] [<0000000030ff3934>] filename_mountpoint+0x17f/0x350 [ 2436.613048] [<00000000df4773bb>] ? user_path_at_empty+0x50/0x50 [ 2436.619301] [<00000000a84dd9a4>] ? __check_object_size+0x252/0x38c [ 2436.625763] [<00000000e6ae3b4e>] ? strncpy_from_user+0x194/0x240 [ 2436.632078] [<000000000715f38e>] ? getname_flags+0x232/0x550 [ 2436.638021] [<00000000d06b4ef9>] user_path_mountpoint_at+0x3a/0x50 [ 2436.644545] [<00000000450311fe>] SyS_umount+0x136/0xd30 [ 2436.649987] [<00000000fdd65d22>] ? __do_page_fault+0x41e/0xa60 [ 2436.656203] [<000000000528b56a>] ? __detach_mounts+0x2f0/0x2f0 [ 2436.662255] [<00000000fa1cd842>] ? __do_page_fault+0x545/0xa60 [ 2436.668338] [<00000000100e2fd6>] ? do_syscall_64+0x4a/0x570 [ 2436.674138] [<000000000528b56a>] ? __detach_mounts+0x2f0/0x2f0 [ 2436.680173] [<0000000075fd4e35>] do_syscall_64+0x1ad/0x570 [ 2436.686010] [<00000000cd05d3fc>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2436.692949] [ 2436.692949] Showing all locks held in the system: [ 2436.699278] 2 locks held by khungtaskd/24: [ 2436.703528] #0: (rcu_read_lock){......}, at: [<00000000490a6d57>] watchdog+0x14b/0xaf0 [ 2436.712888] #1: (tasklist_lock){.+.+..}, at: [<0000000092cc31b9>] debug_show_all_locks+0x7f/0x21f [ 2436.722553] 2 locks held by getty/2034: [ 2436.726519] #0: (&tty->ldisc_sem){++++++}, at: [<00000000600f1187>] ldsem_down_read+0x33/0x40 [ 2436.735844] #1: (&ldata->atomic_read_lock){+.+.+.}, at: [<000000006a8d75b1>] n_tty_read+0x1fe/0x1820 [ 2436.745800] 2 locks held by syz-executor.3/14982: [ 2436.750615] #0: (&type->i_mutex_dir_key#7){++++++}, at: [<00000000a9955f87>] lookup_slow+0x160/0x480 [ 2436.760708] #1: (&fi->mutex){+.+.+.}, at: [<000000007f359d0f>] fuse_lock_inode+0xad/0xe0 [ 2436.769596] 2 locks held by syz-executor.3/15888: [ 2436.774427] #0: (&type->i_mutex_dir_key#7){++++++}, at: [<00000000a9955f87>] lookup_slow+0x160/0x480 [ 2436.784621] #1: (&fi->mutex){+.+.+.}, at: [<000000007f359d0f>] fuse_lock_inode+0xad/0xe0 [ 2436.793775] [ 2436.795391] ============================================= [ 2436.795391] [ 2436.802393] NMI backtrace for cpu 0 [ 2436.806041] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.171+ #49 [ 2436.806054] ffff8801d98d7cc8 ffffffff81b4fb61 0000000000000000 0000000000000000 [ 2436.806067] 0000000000000000 ffffffff81097501 dffffc0000000000 ffff8801d98d7d00 [ 2436.806079] ffffffff81b5adfc 0000000000000000 0000000000000000 0000000000000000 [ 2436.806080] Call Trace: [ 2436.806092] [<0000000006a9b830>] dump_stack+0xc1/0x120 [ 2436.806102] [<000000004c4e4de9>] ? irq_force_complete_move+0x2f1/0x300 [ 2436.806110] [<00000000c71f987a>] nmi_cpu_backtrace.cold+0x47/0x87 [ 2436.806118] [<000000000ea623cf>] ? irq_force_complete_move+0x300/0x300 [ 2436.806126] [<000000002da64967>] nmi_trigger_cpumask_backtrace+0x124/0x155 [ 2436.806134] [<00000000f9f78132>] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2436.806142] [<0000000039f8fc4c>] watchdog+0x670/0xaf0 [ 2436.806148] [<00000000490a6d57>] ? watchdog+0x14b/0xaf0 [ 2436.806156] [<00000000830abbd2>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 2436.806163] [<00000000f95dcbb3>] ? hungtask_pm_notify+0x60/0x60 [ 2436.806170] [<0000000052d39fe4>] kthread+0x278/0x310 [ 2436.806177] [<0000000060cb35c6>] ? kthread_park+0xa0/0xa0 [ 2436.806184] [<00000000b8a8217f>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2436.806195] [<00000000eb724e56>] ? _raw_spin_unlock_irq+0x39/0x60 [ 2436.806204] [<00000000ac47490d>] ? finish_task_switch+0x1e5/0x660 [ 2436.806211] [<0000000051cdbf20>] ? finish_task_switch+0x1b7/0x660 [ 2436.806217] [<000000003ef77223>] ? __switch_to_asm+0x34/0x70 [ 2436.806223] [<00000000f175501d>] ? __switch_to_asm+0x40/0x70 [ 2436.806229] [<000000003ef77223>] ? __switch_to_asm+0x34/0x70 [ 2436.806235] [<0000000060cb35c6>] ? kthread_park+0xa0/0xa0 [ 2436.806242] [<0000000060cb35c6>] ? kthread_park+0xa0/0xa0 [ 2436.806248] [<00000000e715d7ba>] ret_from_fork+0x5c/0x70 [ 2436.806254] Sending NMI from CPU 0 to CPUs 1: [ 2436.807264] NMI backtrace for cpu 1 [ 2436.807267] CPU: 1 PID: 16219 Comm: init Not tainted 4.9.171+ #49 [ 2436.807270] task: 000000000de1d57c task.stack: 00000000907d5742 [ 2436.807273] RIP: 0010:[] c [<00000000100a7536>] io_serial_in+0x6b/0x90 [ 2436.807276] RSP: 0018:ffff8801d4b67570 EFLAGS: 00000002 [ 2436.807279] RAX: dffffc0000000000 RBX: 00000000000003fd RCX: 0000000000000000 [ 2436.807282] RDX: 00000000000003fd RSI: ffffffff81d6f621 RDI: ffffffff84b63b58 [ 2436.807285] RBP: ffff8801d4b67580 R08: ffffffff84064ac0 R09: ffffffff82a550a0 [ 2436.807288] R10: ffffffff83c74b80 R11: 0000000000000001 R12: ffffffff84b63b20 [ 2436.807291] R13: 0000000000000020 R14: fffffbfff096c7ab R15: fffffbfff096c76d [ 2436.807294] FS: 00007f53c9ff37a0(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 2436.807296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2436.807299] CR2: 00007f53c9706a30 CR3: 0000000186f90000 CR4: 00000000001606b0 [ 2436.807302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2436.807305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2436.807307] Stack: [ 2436.807310] ffffffff84b63b20c 000000000000270cc ffff8801d4b675d0c ffffffff81d718c4c [ 2436.807313] ffff8801d4b67608c ffffffff84b63b68c ffffffff84b63d5ac ffffffff841d2383c [ 2436.807316] ffffffff84b63b20c 0000000000000032c dffffc0000000000c 0000000000000032c [ 2436.807318] Call Trace: [ 2436.807321] [<00000000705a9a4c>] wait_for_xmitr+0x94/0x1e0 [ 2436.807323] [<000000009e4fddf9>] serial8250_console_putchar+0x20/0x60 [ 2436.807326] [<000000006bbc8d60>] ? wait_for_xmitr+0x1e0/0x1e0 [ 2436.807329] [<000000008a82e212>] uart_console_write+0x56/0xe0 [ 2436.807331] [<0000000090e83d9b>] serial8250_console_write+0x2fb/0x860 [ 2436.807334] [<0000000082ddf1b6>] ? serial8250_release_port+0x20/0x20 [ 2436.807337] [<00000000b8a8217f>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2436.807340] [<000000007f1d6c51>] ? univ8250_console_setup+0x140/0x140 [ 2436.807343] [<000000002359c87e>] univ8250_console_write+0x5f/0x70 [ 2436.807346] [<000000008621e2de>] call_console_drivers.isra.0.constprop.0+0x1ac/0x360 [ 2436.807348] [<000000003d9db6f1>] console_unlock+0x47c/0xb20 [ 2436.807351] [<00000000508ac992>] ? uart_add_one_port+0xea0/0xea0 [ 2436.807354] [<0000000035eb0af3>] console_device+0x97/0xc0 [ 2436.807356] [<00000000846f97f1>] tty_open+0x796/0xe10 [ 2436.807359] [<00000000d574ab7f>] ? tty_init_dev+0x420/0x420 [ 2436.807361] [<000000007721567a>] ? chrdev_open+0xca/0x630 [ 2436.807364] [<00000000d574ab7f>] ? tty_init_dev+0x420/0x420 [ 2436.807366] [<0000000010a787cc>] chrdev_open+0x230/0x630 [ 2436.807369] [<00000000e06839e3>] ? cdev_put.part.0+0x50/0x50 [ 2436.807372] [<000000004783edd0>] do_dentry_open+0x422/0xd20 [ 2436.807374] [<00000000e06839e3>] ? cdev_put.part.0+0x50/0x50 [ 2436.807386] [<00000000e8f23a3c>] vfs_open+0x105/0x230 [ 2436.807389] [<000000008f032799>] ? may_open.isra.0+0x139/0x290 [ 2436.807391] [<00000000ef0abcf7>] path_openat+0xbf5/0x2f60 [ 2436.807394] [<00000000be51cd63>] ? path_mountpoint+0x6d0/0x6d0 [ 2436.807397] [<00000000834e0e0e>] do_filp_open+0x1a1/0x280 [ 2436.807399] [<000000007b91c5c7>] ? may_open_dev+0xe0/0xe0 [ 2436.807402] [<00000000ef39ab81>] ? __alloc_fd+0x1d4/0x490 [ 2436.807405] [<00000000974fa7b3>] ? _raw_spin_unlock+0x2d/0x50 [ 2436.807407] [<00000000ef39ab81>] ? __alloc_fd+0x1d4/0x490 [ 2436.807410] [<00000000a9ab66a9>] do_sys_open+0x2f0/0x610 [ 2436.807412] [<0000000095de6386>] ? filp_open+0x70/0x70 [ 2436.807415] [<00000000830abbd2>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 2436.807417] [<0000000002dd16ee>] SyS_open+0x2d/0x40 [ 2436.807420] [<000000001b9d66d6>] ? do_sys_open+0x610/0x610 [ 2436.807422] [<0000000075fd4e35>] do_syscall_64+0x1ad/0x570 [ 2436.807425] [<00000000cd05d3fc>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 2436.807435] Code: c24 cc9 c00 c00 c00 c49 c8d c7c c24 c38 c48 cb8 c00 c00 c00 c00 c00 cfc cff cdf c48 c89 cfa c48 cc1 cea c03 cd3 ce3 c80 c3c c02 c00 c75 c17 c41 c03 c5c c24 c38 c89 cda cec c<5b> c0f cb6 cc0 c41 c5c c5d cc3 ce8 c58 c97 c78 cff ceb cc2 ce8 cb1 c97 c78 cff ceb c [ 2436.807444] Kernel panic - not syncing: hung_task: blocked tasks [ 2436.807450] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.171+ #49 [ 2436.807460] ffff8801d98d7c60 ffffffff81b4fb61 ffff8801c5fb8000 ffffffff82a79dc0 [ 2436.807470] 00000000ffffffff 0000000000000000 dffffc0000000000 ffff8801d98d7d40 [ 2436.807478] ffffffff813f96aa 0000000041b58ab3 ffffffff82e2efd2 ffffffff813f94d1 [ 2436.807480] Call Trace: [ 2436.807487] [<0000000006a9b830>] dump_stack+0xc1/0x120 [ 2436.807494] [<00000000385d7a43>] panic+0x1d9/0x3bd [ 2436.807501] [<000000007bd35676>] ? add_taint.cold+0x16/0x16 [ 2436.807508] [<000000000ea623cf>] ? irq_force_complete_move+0x300/0x300 [ 2436.807516] [<00000000e57cd04f>] ? ___preempt_schedule+0x16/0x18 [ 2436.807523] [<000000002824924a>] ? nmi_trigger_cpumask_backtrace+0x135/0x155 [ 2436.807530] [<00000000dc1d58e5>] ? nmi_trigger_cpumask_backtrace+0x13f/0x155 [ 2436.807537] [<000000000cfd46fe>] watchdog+0x681/0xaf0 [ 2436.807544] [<00000000490a6d57>] ? watchdog+0x14b/0xaf0 [ 2436.807550] [<00000000830abbd2>] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 2436.807558] [<00000000f95dcbb3>] ? hungtask_pm_notify+0x60/0x60 [ 2436.807564] [<0000000052d39fe4>] kthread+0x278/0x310 [ 2436.807571] [<0000000060cb35c6>] ? kthread_park+0xa0/0xa0 [ 2436.807577] [<00000000b8a8217f>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2436.807585] [<00000000eb724e56>] ? _raw_spin_unlock_irq+0x39/0x60 [ 2436.807592] [<00000000ac47490d>] ? finish_task_switch+0x1e5/0x660 [ 2436.807600] [<0000000051cdbf20>] ? finish_task_switch+0x1b7/0x660 [ 2436.807606] [<000000003ef77223>] ? __switch_to_asm+0x34/0x70 [ 2436.807611] [<00000000f175501d>] ? __switch_to_asm+0x40/0x70 [ 2436.807617] [<000000003ef77223>] ? __switch_to_asm+0x34/0x70 [ 2436.807624] [<0000000060cb35c6>] ? kthread_park+0xa0/0xa0 [ 2436.807630] [<0000000060cb35c6>] ? kthread_park+0xa0/0xa0 [ 2436.807636] [<00000000e715d7ba>] ret_from_fork+0x5c/0x70 [ 2436.813350] Kernel Offset: disabled [ 2437.540023] Rebooting in 86400 seconds..